期刊文献+

对一种无证书代理签名方案的分析与改进 被引量:4

Analysis and improvement of certificateless proxy signature scheme
在线阅读 下载PDF
导出
摘要 分析了一种无证书代理签名方案,指出其针对于无证书密码系统中的两类敌手都不安全。类型I敌手可替换用户的公钥来伪造代理授权和代理签名;类型II敌手(KGC)可针对预先选择好的用户生成特殊的系统参数,然后伪造代理授权。为了克服这些安全问题,提出了一种改进的方案,分析表明,新方案具有更好的安全性。 This paper analyzes a certificateless proxy signature scheme and points out it are vulnerable against two types of adversaries in certificateless cryptosystems. Type I adversary can replace the user’public key to forge proxy delega-tions from any original signer to any proxy signer and compute the proxy signature;type II adversary(KGC)can generate the trapdoor system parameters according to the identity information of a pre-selected target user and then forge the proxy delegations from the target user to other users. To overcome these security problems, a new improved proxy signature scheme is proposed. Analysis shows that the new scheme has better security.
出处 《计算机工程与应用》 CSCD 2014年第22期115-117,140,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61173190 No.61273311) 陕西省自然科学基础资助项目(No.2010JQ8027) 陕西省教育厅科研计划项目(No.2010JK398 No.12JK1003) 中央高校基本科研业务费专项基金资助项目(No.GK201002041) 陕西师范大学研究生培养创新基金(No.2013CXS024)
关键词 无证书签名 代理签名 公钥替换攻击 恶意的KGC攻击 双线性对 certificateless signature proxy signature public key replacement attacks malicious KGC attacks bilinear mapping
  • 相关文献

参考文献15

二级参考文献69

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:105
  • 2蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 3ShamirA.Identity-basedCryptosystemsandSignature Schemes[C]//Proceedings of CRYPTO'84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 4Mambo M,Usuda K,Okamoto E.Proxy Signatures for Delegating Signing Operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996:48-57.
  • 5Zhang Fangguo,Kim K.Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[C]//Proceedings of the 8th Australasian Conference on Information Security and Privacy.Berlin,Germany:Springer-Verlag,2003:312-323.
  • 6Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C]//Proceedings of the 1st ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1993:62-73.
  • 7Xu Jing,Zhang Zhenfeng,Feng Dengguo.ID-based Proxy Signature Using Bilinear Pairings[C]//Proceedings of the 3rd International Symposium on Parallel and Distributed Processing and Applications.Berlin,Germany:Springer-Verlag,2005:359-367.
  • 8Wu Wei,Mu Yi,Susilo W,et al.Identity-based Proxy Signature From Pairings[C]//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Berlin,Germany:Springer-Verlag,2007:22-31.
  • 9Canetti R,Goldreich O,Halevi S.The Random Oracle Methodology[C]//Proceedings of the 30th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1998:209-218.
  • 10Xun Yi,An Identity-based Signature Scheme from the Weil Pairing[J].IEEE Communications Letters,2003,7(2):76-78.

共引文献27

同被引文献23

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部