期刊文献+

对一种无证书聚合签名方案的攻击与改进 被引量:1

Attack and Improvement on a Certificateless Aggregate Signature Scheme
下载PDF
导出
摘要 无证书聚合签名方案能够有效提高签名验证阶段的效率,其存在两类攻击,在类型I攻击中,攻击者不知道系统主密钥和用户的部分私钥,但能替换用户的公钥;在类型II攻击中,攻击者知道系统主密钥和用户的部分私钥,但不能替换用户公钥.无证书聚合签名方案只有同时能够抵抗这两类攻击,才能说明方案是安全的.大多数无证书聚合签名方案在随机预言机模型下证明了其安全性,但是有些方案不能抵抗类型II攻击.以陈提出的无证书聚合签名方案为例,给出一种适用于一些无证书聚合签名方案的对应攻击方法.攻击者在拥有系统主密钥的情况下,根据两个有效的签名可以伪造出任意一个消息的有效签名.在此基础上提出了一个改进的无证书聚合签名方案,并在随机预言机模型下证明了新方案针对类型I攻击和类型II类攻击是存在性不可伪造的. Certificateless aggregate signature scheme can improve the efficiency of the signature verification phase,and the scheme exists two types of attacks: in type I attack,the adversary cannot access the system's master key and the user's private key,but it can replace the user's public key; in type II attack,the adversary knows the system's master key and the user's private key,but it cannot replace the user's public key. A certificateless aggregate signature scheme is secure if it can resist the two types of attacks at the same time. Most of the certificateless aggregate signature schemes prove to be safe in the random oracle model,but some schemes can not resist type II adversaries. This paper makes the certificateless aggregate signature scheme proposed by Chen as an example which gives the corresponding attack method that is suitable for some certificateless aggregate signature schemes. The attacker who has system master key can forge a valid signature for any messages while knowing two valid signatures. The new scheme is proposed and proved to be existentially unforgeable for the type I and type II adversary in the random oracle model.
出处 《河南师范大学学报(自然科学版)》 CAS 北大核心 2017年第1期71-78,共8页 Journal of Henan Normal University(Natural Science Edition)
基金 国家自然科学基金(11361024 11261019) 江西省自然科学基金项目(20151BAB201002) 江西省研究生创新专项资金项目(YC2015-S255)
关键词 无证书 聚合签名 伪造签名 随机预言机 存在性不可伪造 certificateless aggregate signature forge a signature random oracle model existentially unforgeable
  • 相关文献

参考文献6

二级参考文献72

  • 1程相国,刘景美,王新梅.m-挠群上一种基于身份的聚合签名方案[J].西安电子科技大学学报,2005,32(3):427-431. 被引量:3
  • 2Cheng Xiangguo,Liu Jingmei,Guo Lifeng,Wang Xinmei.IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS[J].Journal of Electronics(China),2006,23(4):569-573. 被引量:11
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, IT-22(6): 644-654.
  • 5SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO'84. Berlin: Springer-Verlag, 1984,47-53.
  • 6Al-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]//Advances in Cryptology- ASIACRYPT'03. Berlin: Springer-Verlag, 2003, 452-473.
  • 7KENT S, LYNN C, SEO K. Secure border gateway protocol (Secure-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000, 28(4): 582-592.
  • 8BONEN D, GENTRY C, LYNN B, et al, Aggregate and erifiably encrypted signatures from bilinear maps[C]/1 Advances in Cryptology-EUROCRYPr03. Berlin: Springer-Verlag, 2003, 416-432.
  • 9LYSYANSKAYA A, MICALI S, REYZIN L, et aI. Sequential aggregate signatures from trapdoor permutations[C]/IAdvances in Cryptology- EUROCRYPr 04. Berlin: Springer-Verlag, 2004, 74-90.
  • 10SHAO Zu-hua. Enhanced aggregate signatures from pairings[C]/fThe SKLOIS Conference on Information Security and Cryptology. Berlin: Springer-Verlage, 2005, 140-149.

共引文献58

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部