期刊文献+

两个标准模型下可证明安全的代理签名方案分析和改进

Analysis and improvement of two provable secure proxy signature schemes in the standard model
下载PDF
导出
摘要 对最近冀会芳等学者和于义科等学者提出的基于Waters的两个标准模型下可证明安全的代理签名方案进行了安全分析,指出了这两个方案中存在的不足和缺陷,即存在授权伪造,任何人可以伪装成原始签名者向代理签名者发出有效的代理授权证书;存在代理签名伪造,任何人在不知道代理签名密钥的情况下,可伪造代理签名者的签名。提出了一个能克服缺陷的、改进的代理签名方案,并对改进方案的正确性、有效性和安全性进行了详细分析。分析显示,与两个原方案相比,改进的方案具有同样的签名长度、几乎一样的执行效率,但是更加安全。 The security of two provable secure proxy signature schemes based on Waters in the standard mode,which are proposed by Ji et al.and Yu et al.recently,is analyzed,and the two drawbacks of the two schemes are pointed out:delegation forgeability exists so that anyone may disguise as the original signer to issue valid proxy delegation warrants to the proxy signer,and proxy signature forgeability exists so that anyone can forge the signature of the proxy signer without knowing the private key of the proxy signer.An improved proxy signature scheme that can overcome the drawbacks is proposed,and its correctness,efficiency and security are analyzed in detail.The analysis shows that the improved scheme has the same length of signature and almost the same execution efficiency in comparison to the two original schemes,but has higher security.
作者 吴淑坤
出处 《计算机工程与科学》 CSCD 北大核心 2014年第11期2153-2158,共6页 Computer Engineering & Science
关键词 代理签名 基于身份的密码 安全分析 不可伪造性 proxy signature identity-based cryptography security analysis unforgeability
  • 相关文献

参考文献4

二级参考文献28

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 2李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 3Huang X, Susilo W, Mu Y, et al. Proxy signature without random oracles [ C] //Proceedings of International Conferenee on Mobile Ad Hoe and Sensor Networks. Berlin/ Heidelberg: Springer-Verlag ,2006:473-484.
  • 4Waters B. Efficient identity-based encryption without random oracles [ C ]//Proceedings of Eurocrypt. Berlin/ Heidelberg: Springer-Verlag,2005 : 114-127.
  • 5Paterson K G, Schuldt J C N. Efficient identity-based signatures secure in the standard model [ C ]//Proceedings of the 11 th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg:Springer-Verlag, 2006:207-222.
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ] //Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag, 1984:47-53.
  • 7Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ]//Proceedings of Crypto. Berlin/Heidelberg: Springer-Verlag,2001:213-229.
  • 8Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation [ C ]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York : ACM, 1996:48-57.
  • 9Kim S, Park S, Won D. Proxy signatures, revisited [ C ]// Proceedings of International Conference on Information and Communications Security. Berlin/Heidelberg: Springer-Verlag, 1997 : 223- 232.
  • 10Zhang F, Kim K. Efficient ID-based blind signature and proxy signature from bilinear pairings [ C ]//Proceedings of the 8th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg: Springer-Verlag, 2003: 312-323.

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部