摘要
异构签密可以保证异构密码系统之间数据的机密性和不可伪造性。2016年,刘景伟等人提出了传统公钥密码和无证书公钥密码之间的PCHS和CPHS双向异构签密方案。但是,经过分析,发现PCHS方案和CPHS方案均不安全。首先描述了第2类敌手对两个方案的攻击过程,其次分析了两个方案存在第2类敌手攻击的原因,最后对PCHS方案和CPHS方案进行改进。改进方案克服了原方案的安全性问题,保证了传统公钥密码和无证书公钥密码环境之间数据的安全传输。
Heterogeneous signcryption can be used to guarantee the confidentiality and unforgeability in the different cryptography. In 2016, between traditional public key cryptography and certificateless public key cryptography, the mutual signcryption schemes including PCHS and CPHS were proposed by Liu et al. However, via the security analysis, it is shown that the above schemes are not secure. Firstly, the processes of attack performed by the second type of adversary are described. Secondly, the possible reasons why the second type of adversary can perform these attacks are analyzed. In the end, the original schemes are improved. The improved schemes can overcome the security weakness of the original schemes, and can also ensure the security of data transmission between traditional public key cryptographic and certificateless public key cryptography.
出处
《电子与信息学报》
EI
CSCD
北大核心
2017年第12期3045-3050,共6页
Journal of Electronics & Information Technology
基金
国家自然科学基金(61163038
61262056)
甘肃省高等学校科研项目(2015B-220
2013A-014)
西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)~~
关键词
签密
异构系统
KGC攻击
选择密文攻击
选择消息攻击
Signcryption
Heterogeneous system
KGC's attack
Chosen cipertext attack
Chosen message attack