期刊文献+

安全高效的无双线性对的无证书签名方案 被引量:3

Secure and efficient certificateless signature scheme without bilinear parings
下载PDF
导出
摘要 针对现有部分无证书签名方案存在效率低和安全性不高的问题,提出一个安全高效的无证书签名方案.首先,方案未使用双线性对运算,在密钥生成时通过哈希函数加强用户公钥元素间的联系;然后,证明了在随机预言机模型下基于椭圆曲线离散对数问题对方案的不可伪造性;最后,分析了方案的无秘钥托管性、不可否认性以及前后向安全性.性能及效率分析结果表明,该方案具有更高的安全性和计算效率. Aiming at the low efficiency and lack of security of some existing certificateless signature schemes,a secure and efficient certificateless signature scheme is proposed.Firstly,the scheme does not use the bilinear parings.It binds all the elements of the public key through the hash function in the key generation.Secondly,the unforgeability of the signature is proved in the random oracle model with assuming that the elliptic curve discrete logarithm problem holds.Finally,the keyless escrow,non-repudiation and forward-backward security of the scheme are analyzed.The experiment results show that the proposed scheme is more efficient and practical.
作者 胡冰洁 周彦伟 杨波 张晶 HU Bing-jie;ZHOU Yan-wei;YANR Bo;ZHANG Jing(School of Computer Science,Shaanxi Normal University,Xi’an 710062,Shaanxi,China;State Key Laboratory of Cryptology,Beijing 100878,China;Xi’an Gaoxin No.1 Middle School East Campus,Xi’an 710075,Shaanxi,China)
出处 《云南大学学报(自然科学版)》 CAS CSCD 北大核心 2021年第3期462-469,共8页 Journal of Yunnan University(Natural Sciences Edition)
基金 国家自然科学基金(61802242,61772326,61802241).
关键词 无证书签名 随机预言机模型 离散对数问题 无双线性对运算 公钥替换攻击 certificateless signature random oracle model elliptic curve discrete logarithm problem without bilinear parings public key replacement attack
  • 相关文献

参考文献6

二级参考文献60

  • 1明洋,姜正涛,王育民.一种改进的强代理签名方案[J].西安电子科技大学学报,2006,33(5):778-781. 被引量:6
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes [C]//Proceedings of Advances in Cryptology- CRYPTO'84.. LNCS 196. Berlin.. Springer-Verlag, 1984.. 47-53.
  • 3Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proceedings of Advances in Cryptology- ASIACRYPTO'03.. LNCS 2 894. Berlin: Springer-Verlag, 2003: 452-473.
  • 4Huang X, Susilo W, Mu Y, et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003[C]// Proceedings of Cryptology and Network Security (CANS'05): LNCS 3 801. Berlin: Springer-Verlag, 2005: 13-25.
  • 5Li X, Chen K, Sun L. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings[J]. Lithuanian Mathematical Journal, 2005, 45(1): 95-103.
  • 6Zhang Z, Wong Duncan S, Xu J, et al. Certificateless Public-Key Signature: Security Model and Efficient Construction [C]//Proceedings of Applied Cryptography and Network Security (ACNS'06): LNCS 3 989. Berlin: Springer-Verlag, 2006 : 293-308.
  • 7Hu B C, Wong D S, Zhang Z, et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature [C]//Proceedings of Information Security and Privacy (ACISP'06): LNCS 4058. Berlin.. Springer-Verlag, 2006: 235-246.
  • 8Ma Chunbo, Ao Faliang, He Dake. Certificateless Group Inside Signature[C]//Proceedings of International Symposium on Autonomous Decentralized Systems (ISADS'05). Chengdu:IEEE Computer Society, 2005: 194-200.
  • 9Yap Wun-She, Heng Swee Huay, Goi Bok-Min. An Efficient Certificateless Signature Scheme[C]//Proceedings of Emerging Directions in Embedded and Ubiquitous Computing (EUC'06): LNCS 4 097. Berlin: Springer-Verlag, 2006: 322-331.
  • 10Goldwasser S, Micali S, Rivest R. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attack[J]. SIAM Journal on Computing, 1988, 17 (2): 281-308.

共引文献56

同被引文献13

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部