期刊文献+

无证书强指定验证者签名的分析与改进

ANALYSIS AND IMPROVEMENT OF CERTIFICATELESS STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
下载PDF
导出
摘要 对Hafizul等提出的无证书强指定验证者签名方案进行安全分析,指出该方案不能抵抗授权攻击和恶意但被动的KGC(Key Generation Center)的普遍伪造攻击。同时也指出了另外一个缺陷,即不仅指定验证者的私钥可以验证签名,而且签名者的私钥也可以验证签名。提出改进的方案,改进方案克服了原方案的安全缺陷,提高了系统的安全性。 We make the security analysis on the certificateless strong designated verifier signature scheme proposed by Hafizul et al.,andpoint out that the scheme can’t resist to the delegatability attack and to universal forgeability attack by malicious-but-passive KGC (keygeneration centre).Moreover,we point out another bug,that is,the signature can be verified not only with the designated verifier’s secretkey but also with the signer’s secret key.The improved scheme is proposed,it overcomes the security flaws of original scheme and enhancesthe security of the system.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第9期283-287,308,共6页 Computer Applications and Software
基金 湖北省教育厅科学技术研究项目(Q2111113) 武汉科技大学冶金工业过程系统科学湖北省重点实验开放基金资助项目(Y201315 Y201118)
关键词 指定验证者签名 授权攻击 伪造攻击 Designated verifier signature Delegatability attack Forgeability attack
  • 相关文献

参考文献16

  • 1Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs andtheir applications[C]//Advances in Cryptology-EUROCRYPT ’96.Berlin:Springe-Verlag,1996:143-154.
  • 2Lee J S,Chang J H.Comment on Saeednia et al.’s strong designatedverifier signature scheme[J].Computer Standards & Interfaces,2009,31(1):258-260.
  • 3Lipmaa H,Wang G,Bao F.Designated verifier signature schemes:at-tacks,new security notions and a new construction[C]// The 32^nd In-ternational Colloquium on Automata,Languages and Programming(ICALP 2005).Berlin:Springer-Verlag,2005:459-471.
  • 4Li Y,Lipmaa H,Pei D.On delegatability of four designated verifiersignatures[C]//Proceedings of the 7^th International Conference on In-formation and Communications Security(ICICS 2005).Berlin:Springer-Verlag,2005:61-71.
  • 5Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//Advances in Cryptology-ASIACRYPT 2003.Berlin:Springer-Verlag,2003:452-473.
  • 6Saeednia S,Kremer S,Markowitch O.An efficient strong designatedverifier signature scheme[C]//Proceedings of International Conferenceon Information Security and Cryptology(ICISC 2003).Berlin:Spring-er-Verlag,2004:40-54.
  • 7Feng D,Xu J,Chen W.Generic Constructions for Strong DesignatedVerifier Signature[J].Journal of Information Processing Systems,2011,7(1):159-172.
  • 8Huang Q,Yang G,Wong D S,et al.Efficient strong designated veri-fier signature schemes without random oracle or with non-delegatability[J].International Journal of Information Security,2011,10(6):373-385.
  • 9Tian H,Chen X,Jiang Z,et al.Non-delegatable strong designatedverifier signature on elliptic curves[C]//Information Security andCryptology-ICISC 2011.Berlin:Springer-Verlag,2012:219-234.
  • 10Tian H,Jiang Z,Liu Y,et al.A Non-delegatable Strong DesignatedVerifier Signature without Random Oracles[C]//Proceedings of the2012 Fourth International Conference on Intelligent Networking andCollaborative Systems.IEEE Computer Society,2012:237-244.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部