期刊文献+

无证书签名方案的分析与改进 被引量:1

Analysis and improvement of certificateless signature scheme
下载PDF
导出
摘要 针对汤永利等提出的9种无证书签名方案(汤永利,王菲菲,叶青,等.改进的可证明安全无证书签名方案.北京邮电大学学报,2016,39(1):112-116),首先使用线性化方程分析方法,发现所有方案中公钥之间存在线性关系,利用此缺陷完成对所有方案的签名伪造攻击;其次,为打破公钥之间的线性关系,使用改造哈希函数参数的方法改进方案,并在随机预言机模型下证明了改进方案的安全性;然后,提出一种无证书签名方案中的公钥构造格式,通过该格式构造出的签名方案无法被敌手进行公钥替换攻击;最后,通过仿真对改进方案与现有的无证书签名方案进行效率比较。实验结果表明,改进方案在提高安全性的同时未降低计算效率。 For nine certificateless signature schemes proposed by Y L Tang, et al.(TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116), firstly, the linearized equation analysis method was used. It was found that there was a linear relationship between the public keys in all schemes. This defect was exploited to complete a signature forgery attack on all schemes. Secondly, in order to break the linear relationship between the public keys, the method of modifying the parameters of hash function was used to improve the scheme, and the security of the improved scheme was proved under the random oracle model. Thirdly, a public key construction format of certificateless signature scheme was proposed. The signature scheme constructed by this format could not be attacked by adversaries using public key replacement. Finally, the efficiency of the improved scheme was compared with those of the existing certificateless signature schemes through simulation. Experimental results show that the improved scheme promotes the security without reducing the computational efficiency.
作者 赵洪 喻书涵 韩妍妍 李兆斌 ZHAO Hong;YU Shuhan;HAN Yanyan;LI Zhaobin(Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机应用》 CSCD 北大核心 2023年第1期147-153,共7页 journal of Computer Applications
基金 北京高校高精尖学科建设项目(20210048Z0402)。
关键词 无证书签名 线性化方程分析 伪造攻击 随机预言机模型 可证明安全 certificateless signature linearized equation analysis forgery attack random oracle model provable security
  • 相关文献

参考文献8

二级参考文献61

  • 1AL-RIYAMI S S, PATERSON K G. Certificateless public key cryp- tography[A]. Proc of Asiacrypt 2003[C]. Springer-Verlag, Berlin, 2003.452-473.
  • 2CHOI K Y, PARK J H, HWANG J Y, et al. Efficient certificateless signature schemes[A]. Proc of the ACNS 2007 LNCS 4521[C]. Hei- delberg: Springer-Verlag, 2007.443-458.
  • 3HARN L, REN J, L1N C L. Design of DL-basedcertificateless digital signatures[J]. Journal of Systems and Software, 2009,82(5):789-793.
  • 4LIPPOLD G, BOYD C, N1ETO J M G. Efficient certificateless KEM in the standard model[A]. Proc of the ICISC 2009 LNCS 5984[C]. Heidelberg: Springer-Verlag, 2010.34-46.
  • 5HUANG X, MU Y, SUSILO W, et al. Certificateless signatures: new schemes and security models[J]. The Computer Journal, 2012, 55(4): 457-474.
  • 6HU B, WONG D, ZHANG Z, et al. Key replacement attack against a generic construction of certificateless signature[A]. Proc of the llth Australasian Conference on Information Security and Privacy[C]. Mel-bourne, Australia, 2006. 235-246.
  • 7YAP W S, HENG S H, GOI B M. An efficient certificateless signa-ture scheme[A]. Emerging Directions in Embedded and Ubiqui- ous Computing: EUC 2006, LNCS 4097[C]. Berlin: Springer-Verlag, 2006.322-331.
  • 8. L1 J G, HUANG X Y, MU Y, et aLCryptanalysis and improvement of an efficient certificateless signature scheme[J]. Journal of Communi- cations and Networks, 2008,10( 1 ): 10-17.
  • 9TIAN M, HUAN L. Cryptanalysis of a certificateless signature sche- mewithout pairings[EB/OL].http://onlinelibrary.wiley.com/doi/ 10.1002/ dac.2310/full,2012.
  • 10HE D, CHEN J, ZHANG R. An efficient and provably-secure certifi- cateless signature scheme without bilinear pairings[J]. International Journal of Communication Systems, 2012, 25(11): 1432-1442.

共引文献60

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部