期刊文献+

两个高效无证书签名方案的替换公钥攻击 被引量:1

PUBLIC-KEY REPLACEMENT ATTACK AGAINST TWO EFFICIENT CERTIFICATELESS SIGNATURE SCHEMES
下载PDF
导出
摘要 对新近提出的两个高效无证书签名方案进行安全性分析,指出这两个签名方案都能受到替换公钥攻击。任意攻击者都可以通过替换签名人的公钥从而达到对任意选择的消息成功伪造签名,分析这两个签名方案能受到替换公钥攻击的根本原因。最后通过这两个攻击总结分析了无证书签名方案设计过程需要注意的要点,这对无证书签名方案的设计具有借鉴意义。 We analyse the security of two efficient certificateless signature schemes presented recently, and point out that they can all suffer from the public-key replacement attack.Any attacker can forge valid signature successfully on the message optionally selected by replacing the keys of the singers.We also analyse the primary reason of the public-key replacement attack against these two signature schemes.Finally, through these two attacks we summarise and analyse some key points that have to pay attention to in the process of certificateless signature schemes design, which is of referential significance to the design of the certificateless signature schemes.
出处 《计算机应用与软件》 CSCD 北大核心 2014年第12期311-313,322,共4页 Computer Applications and Software
基金 国家自然科学基金项目(61373140) 福建省教育厅项目(JA12291) 莆田学院教改项目(JG2012020)
关键词 数字签名 无证书 替换公钥攻击 双线性对 安全性分析 Digital signature Certificateless Public-key replacement attack Bilinear pairings Security analysis
  • 相关文献

参考文献12

二级参考文献67

  • 1Al-Riyami S,Paterson K.Certificateless public key cryptography[C]//Advances in Cryptology proceeding of Asiacrypt 2003,Lecture Notes in Computer Science 2894,Berlin:Springer-Verlag,2003:452-473.
  • 2Yum D,Lee P.Generic construction of certificateless signature[C]//Advances in ACISP 2004,Lecture Notes in Computer Science 3108.Berlin:Springer-Verlag,2004:200-211.
  • 3Hu B,Wong D,Zhang Z,et al.Key replacement attack against a generic construction of certificateless signature[C]//Advances in Privacy ACISP 2006,Lecture Notes in Computer Science 4058,Berlin:Springer-Verlag,2006:235-246.
  • 4Li X,Chen K,Sun L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal,2005,45(1):76-83.
  • 5Wang L,Cao Z,Li X,et al.Certificateless threshold signature schemes[C]//Advances in CIS 2005,Lecture Notes in Artificial Intelligence 3802,Berlin Springer-Verlag,2005:104-109.
  • 6Huang Xinyi,Susilo Willy,Mu Yi,et al.Certificateless designated verifier signature schemes[C]//Proceedings of the 20th International Conference on Advanced Information Networking and Applications(AINA06),Vienna,Austria.Piscataway,NJ,USA:IEEE,2006:15-19.
  • 7Tsz Hon Yuen,Victor K Wei.Fast and Proven Secure Blind Identity Based Signcryption from Pairings[C]//CT RSA 2005,Lecture Notes in Computer Science 3376,Berlin:Springer-Verlag,2005:305-322.
  • 8BESSIE C H, ZHANG Z F, DENG X T. Certificateless signature: a new security model and an improved generic construction[J]. Designs, Codes and Cryptography, 2007, 42(2): 109-12.6.
  • 9SATTAM S A, KENNETH G P. Certificateless public key cryptography[A]. Proc Asiacrypt'03[C]. Springer-Verlag, 2003.452-473.
  • 10ZHANG Z F, FENG D G. On the security of a certificateless public-key encryption [EB/OL]. http://eprint.iacr.org/2005/426.

共引文献37

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部