期刊文献+

一种无证书签名方案的分析与改进 被引量:3

Analysis and Improvement of Certificateless Signature Scheme
下载PDF
导出
摘要 分析张燕燕等人提出的基于离散对数问题的无证书签名方案(计算机工程与应用,2011年第12期),指出在该方案中,敌手通过替换公钥可以伪造任何签名人对任意消息的签名,并提出一个无需双线性对运算的改进方案。理论分析结果证明,改进方案在最强安全模型下是存在性不可伪造的,且签名和验证效率更高。 This paper analyzes a certificateless signature scheme based on discrete logarithm problem, which is proposed by Zhang Yanyan et al and points out that their scheme is universally forgeable, and an adversary can forge any signer's valid signature on any message by replacing public key. It also presents an improved scheme which is proved to be existentially unforgeable in a super security model. In addition, the improved scheme has the advantage of high computation efficiency, as there is no heavily cost bilinear pairing operation in the improved scheme.
出处 《计算机工程》 CAS CSCD 2012年第9期15-18,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60603012) 湖北省教育厅科学技术研究基金资助项目(Q20111113)
关键词 离散对数问题 无证书签名 普遍伪造 存在性不可伪造 双线性对 Discrete Logarithm Problem(DLP) certificateless signature universally forgeable existentially unforgeable bilinear pairingsDOI: 10.3969/j.issn. 1000-3428.2012.09.005
  • 相关文献

参考文献8

  • 1Al-Riyami S S,Paterson K.Certificateless Public KeyCryptography[C]//Proc.of ASIACRYPT’03.Berlin,Germany:Springer-Verlag,2003:452-473. 被引量:1
  • 2Yap W S,Heng S H,Goi B M.An Efficient CertificatelessSignature Scheme[C]//Proc.of International Conference onEmbedded and Ubiquitous Computing.Seoul,Korea:Springer-Verlag,2006:322-331. 被引量:1
  • 3Park J H,Kang B G.Security Analysis of the CertificatelessSignature Scheme Proposed at SecUbiq 2006[C]//Proc.ofInternational Conference on Embedded and Ubiquitous Computing.Berlin,Germany:Springer-Verlag,2007:686-691. 被引量:1
  • 4Huang Xinyi,Mu Yi,Susilo W,et al.Certificateless SignatureRevisited[C]//Proc.of the 12th Australasian Conference onInformation Security and Privacy.Santa Barbara,California,USA:Springer-Verlag,2007:308-322. 被引量:1
  • 5Kyung-Ah S.Breaking the Short Certificateless SignatureScheme[J].Information Sciences,2009,179(3):303-306. 被引量:1
  • 6张建中,彭丽慧,薛荣红.一个无证书代理盲签名方案[J].计算机工程,2011,37(14):112-113. 被引量:9
  • 7张艳艳,王亮亮.新型的基于DLP的无证书签名方案[J].计算机工程与应用,2011,47(12):62-64. 被引量:5
  • 8Pointcheval D,Stern J.Security Arguments for Digital Signaturesand Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396. 被引量:1

二级参考文献15

  • 1YANG Chen MA Wen-ping WANG Xin-mei.Secure mediated certificateless signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(2):75-78. 被引量:4
  • 2Shamir A.Identity-based ctyptosystems and signature schemes[C]//LNCS 196:Cryptology-Crypto'84.Berlin:Springer-Verlag,1985:7-53. 被引量:1
  • 3AI-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//LNCS 2894:Cryptography-Asiacrypt'03.Berlin:SpringerVerlag,2003:452-473. 被引量:1
  • 4Huang Xin-yi,Susilo W,Mu Y.On the security of certificateless signature schemes from Asiacrypt 2003[C]//LNCS 3810:International Conference on Cryptology and Network Security-CANS'05.Berlin:Springer-Verlag,2005:13-25. 被引量:1
  • 5Choudary G M,Ashutosh S.An efficient certificateless signature scheme[C]//LNAI 3802:Computational Intelligence and SecurityCIS'05.Berlin:Springer-Verlag,2005:110-116. 被引量:1
  • 6Li X,Chen K.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lietuvos Matematikos Rinkinys,2005,45(1):95-103. 被引量:1
  • 7Duan Shan-shan.Certificateless undeniable signature scheme[J].Information Sciences:An International Journal,2008,178(3):742-755. 被引量:1
  • 8Ong H,Schnorr C.Fast signature generation with a fiat shamirlike scheme[C]//Advances in Cryptology-EUROCRYPT'90.Berlin:Springer-Verlag,1991. 被引量:1
  • 9Lein H,Jian R,Changlu L.Design of DL-based certificateless digital signatures[J].Journal of Systems and Software,2009,82(5):789-793. 被引量:1
  • 10Mambo M, Usuda K, Okamoto E. Proxy Signature: Delegation ofthe Power to Sign Messages[EB/OL]. (1996-09-15). http:// citeseerx.ist.psu.edu/viewdoc/download?doi= 10.1.1.14.8266. 被引量:1

共引文献11

同被引文献32

  • 1AL-RIYAMI S, PATERSON K G. Certifieateless public key cryp- tography [ C] // Advances in Cryptology - ASIACRYPT 2003, LNCS 2894. Berlin: Springer-Verlag, 2003:452-473. 被引量:1
  • 2CHOI K Y, PARK J H, LEE D. Efficient certificateless signature schemes [ C]// Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Berlin: Springer-Ver- lag, 2007:443 -458. 被引量:1
  • 3AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography [C]// ASIACRYPT 2003:Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003:452-473. 被引量:1
  • 4HUANG X,MU Y,SUSILO W,et al.Certificateless signatures:new schemes and security models [J].The Computer Journal,2004,55(4):457-474. 被引量:1
  • 5HU B C,WONG D S,ZHANG Z,et al.Key replacement attack against a generic construction of certificateless signature [C]// ACISP 2006:Proceedings of the 11th Australasian Conference on Information Security and Privacy,LNCS 4058.Berlin:Springer,2006:235-246. 被引量:1
  • 6KIPNIS A,SHAMIA A.Cryptanalysis of the HFE public key cryptosystem by relinearization [C]// CRYPTO'99:Proceedings of the 19th Annual International Cryptology Conference Advances in Cryptology,LNCS 1666.Berlin:Springer,1999:19-30. 被引量:1
  • 7COURTOI N,KLIMOV A,PATARIN J.Efficient algorithms for solving overdefined systems of multivariate polynomial equations [C]// EUROCRYPT 2000:Proceedings of the 2000 International Conference on the Theory and Application of Cryptographic Techniques,LNCS 1807.Berlin:Springer,2000:392-407. 被引量:1
  • 8Shamir A. Identity-based Cryptosystems And Signature Schemes ~ C ~//Proceedings of Cryptology-Crypto ' 84. Washington D. C., USA : IEEE Press, 1984:47-53. 被引量:1
  • 9AI-Riyami S S,Paterson K G. Certificateless Public Key Cryptography ~ C 1//Proceedings of ASIACRYPT ' 03. B erlin, Germany : Springer, 2003 : 452-473. 被引量:1
  • 10Harn L, Ren J, Lin C L. Design of DL-based Certificateless Digital Signatures I J ]. Journal of Systems and Software, 2009,82 ( 5 ) : 789-793. 被引量:1

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部