摘要
无证书密码体制结合了基于身份密码体制和传统公钥密码体制的优点,受到了密码和信息安全研究者的极大关注.对梁景玲等提出的消息可恢复的无证书签名方案和侯红霞等提出的无证书短签名方案进行安全性分析,发现两个方案都不能抵抗公钥替换攻击.通过修改签名者密钥生成算法,增加对用户公钥的有效性验证,提高了梁等方案的安全性.通过在签名阶段将用户公钥绑定进HaSh函数,弥补了侯等方案的安全缺陷.
Certificateless cryptography has been a great attention of cryptography and information security researchers, which combines the advantages of identity-based cryptography (without certificate) and traditional public key cryptography (no escrow). The certificateless signature scheme with message recovery proposed by Liang et al and the certificateless short signature scheme proposed by Hou et al was cryptanalysis, and the results show that they are both insecure under public key replacement attacks. The Liang et al.'s scheme is improved by modifying the user key generation algorithm and increasing verification of the user's public key. The Hou et al.'s scheme is improved by binding the user's public key to Hash function when signature is generated.
出处
《数学的实践与认识》
北大核心
2016年第7期139-143,共5页
Mathematics in Practice and Theory
基金
国家自然科学基金(61272465)
河南省自然科学基金(142400410486)
关键词
证书密码体制
短签名
双线性对
离散对数
消息恢复
公钥替换攻击
certificateless cryptography
short signature
bilinear pairings
discrete logarithms
message recovery
public key replacement attacks