[1]夏爱东,王志伟. 无证书签名方案的安全性分析及改进[J].计算机技术与发展,2015,25(11):134-138.
 XIA Ai-dong,WANG Zhi-wei. Security Analysis and Improvement of Certificateless Signature Scheme[J].,2015,25(11):134-138.
点击复制

 无证书签名方案的安全性分析及改进()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年11期
页码:
134-138
栏目:
安全与防范
出版日期:
2015-11-10

文章信息/Info

Title:
 Security Analysis and Improvement of Certificateless Signature Scheme
文章编号:
1673-629X(2015)11-0134-05
作者:
 夏爱东王志伟
 南京邮电大学 计算机学院
Author(s):
 XIA Ai-dongWANG Zhi-wei
关键词:
 无证书签名双线性对公钥替换攻击恶意KGC攻击安全性分析
Keywords:
 certificateless signaturebilinear pairingspublic key replacement attackmalicious KGC attacksecurity analysis
分类号:
TP301
文献标志码:
A
摘要:
 近年来,为了解决身份基密码系统中固有的密钥托管问题,无证书公钥密码系统的概念被提出.对潘帅(2013)等提出的无证书签名方案进行安全性分析,指出该方案存在着公钥替换攻击和恶意KGC攻击,并给出具体攻击方法.针对上述问题,文中采用改变传统无证书签名算法顺序,定期更新用户秘密值来对原方案进行改进.改进方案同时加强了用户身份信息与其他参数的关联程度,以达到安全性要求.并基于离散对数问题、CDH问题和Inv-CDH问题的困难性假设,在随机预言模型中证明了改进方案的安全性.与潘方案比较,发现改进后的签名方案在整体性能上有更高的优势,且具有了前向安全性.
Abstract:
 Recently,in order to eliminate the key-escrow problem in identity based cryptography,the notion of certificateless public key cryptography was proposed. Security analysis is carried out for the certificateless signature scheme presented by Pan et al,which shows that the scheme is insecure against public key replacement attack and malicious KGC attack. Detailed attack method is given. Aiming at these problem,the scheme is improved by the modification of traditional certificateless signature algorithm sequence and regularly update of user’ s secret values in this paper. And the improved scheme also enhances the relationship between identity information with other pa-rameters to meet the security requirements. Its security relies on the hardness of the DL problem,CDH problem and Inverse-CDH prob-lem. Under the random oracle model,the new scheme is proved to be secure. Furthermore,it has better overall performances and forward security than the scheme presented by Pan et al.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(11):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(11):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(11):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(11):47.
[11]史华婷,万中美. 一种无证书签名方案的分析与改进[J].计算机技术与发展,2017,27(05):133.
 SHI Hua-ting,WAN Zhong-mei. Analysis and Improvement of a Certificateless Signature Scheme[J].,2017,27(11):133.

更新日期/Last Update: 2016-01-05