期刊文献+

一个强安全的无证书签名方案的分析和改进 被引量:1

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme
下载PDF
导出
摘要 无证书公钥密码体制结合了基于身份的密码体制和传统PKI公钥密码体制的优势,克服了基于身份的公钥密码体制的密钥托管问题及PKI系统的证书管理问题,具有明显的优势。对Hassouna等提出的一个强安全无证书签名方案进行安全分析。结果表明,该方案不能验证消息的完整性,存在消息篡改攻击,且方案未使用根据系统主密钥生成的私钥进行签名,所以不是无证书签名方案。在此基础上,提出了一个改进的无证书签名方案,在随机预言机模型下,基于椭圆曲线Diffie-Hellman问题假设,证明了该方案可以抵抗第一类强敌手和第二类敌手的攻击,满足存在性不可伪造的安全性。 Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem of PKI system,and has obvious advantages.By analysing the security of a strongly secure certificateless signature scheme proposed by Hassouna,et al,it shows that the scheme cannot resist the attack of falsifying messages and do not use private key generated by system master key to sign.So it is not a certificateless signature scheme.On this basis,an improved certificateless signature scheme is proposed and it proves the scheme can resist the attack of the first class of strong adversaries and the second class of adversaries.In the random oracle model and under the assumption of the Diffie-Hellman problem of the elliptic curve,the improved scheme satisfies the existential forgery.
作者 叶胜男 陈建华 YE Sheng-nan;CHEN Jian-hua(School of Mathematics and Statistics,Wuhan University,Wuhan 430000,China)
出处 《计算机科学》 CSCD 北大核心 2021年第10期272-277,共6页 Computer Science
关键词 无证书签名 双线性对 安全性分析 椭圆曲线Diffie-Hellman问题 随机预言机模型 Certificateless signature Bilinear pairings Security analysis Elliptic curve discrete Diffie-Hellman problem Random oracle model
  • 相关文献

参考文献3

二级参考文献22

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-Crypto'84. Berlin: Springer-Verlag, 1985, LNCS 196: 7-53.
  • 2AL-RIYAMI S S, PATERSON K G Certificateless public key cryptography[C]//Advances in Cryptography-Asiacry- pt'03. Berlin: Springer-Verlag, 2003, LNCS 2894: 452-473.
  • 3HUANG Xin-yi, SUSILO W, Mu Y, et al. On the security of certificateless signature schemes from Asiacrypt 2003[C]// International Conference on Cryptology and Network Security-CANS'05. Berlin: Springer-Verlag, 2005, LNCS 3810: 13-25.
  • 4CHOUDARY G M, ASHUTOSH S. An efficient certificateless signature scheme[C]//Computational Intelligence and Security-CIS'05. Berlin: Springer-Verlag, 2005, LNAI 3802: 110-116.
  • 5LI X, CHEN K. Certificateless signature and proxy signature schemes from bilinear pairings[J]. Lietuvos Matematikos Rinkinys, 2005, 45(1): 95-103.
  • 6BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 7BARRETO P S L M, LIBERT B, McCullagh N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps[C]//Advances in Cryptology-Asiacrypt'05. Berlin: Springer-Verlag, 2005, LNCS 3788:515-532.
  • 8BARRETO P S L M, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based cryptosystems[C]//Advances in Crptology-Crypto'02. Berlin: Springer-Verlag, 2002, LNCS 2442: 354-368.
  • 9ZHANG F, SAFAVI-NAINI signature scheme from R, SUSILO W. An efficient bilinear pairings and its applications[C]//Practice and Theory in Public Key Cryptography-PKC'04. Berlin: Springer-Verlag, 2004, LNCS 2947: 277-290.
  • 10BELLARE M, ROGAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[C]// ACM Conference on Computer and Communications Security- ACMCCS'93. [S.l.]: ACM Press, 1993: 62-67.

共引文献32

同被引文献24

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部