计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 126-128.
刘唐,汪小芬,丁雪峰
LIU Tang,WANG Xiao-fen and DING Xue-feng
摘要: Hafizul Islam SK 和 G.P.Biswas最近基于椭圆曲线双线性对提出一个无证书强指定验证者签名方案,并声称该方案在三类敌手攻击模型下是可证明安全的,即第一类只得到系统公开参数和公钥的敌手,第二类可替换签名和验证者公钥的敌手,第三类可得到系统主密钥的敌手。分析该强指定验证者签名方案不能抵抗第三类敌手的攻击,亦即第三类敌手可以伪造有效的签名。针对此缺陷,对该无证书强指定验证者签名方案做了改进,在改进方案中,验证者的秘密私钥(由参与者独立产生的私钥)参与签名的验证计算,因此有效避免了原有方案的安全缺陷。最后对改进方案作了安全性分析,说明改进方案确实能抵抗三类敌手的攻击。
[1] Diffie W,Hellman M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654 [2] Shamir A.Identity based cryptosystems and signature scheme[C]∥Crypto 1984,LNCS.vol.196,Springer-Verlag,1984:47-53 [3] Miller V S.Use of elliptic curves in cryptography[C]∥Procee-ding of the Crypto’85.New York:Springer-Verlag,1985:417-426 [4] Koblitz N.Elliptic curve cryptosystem[J].Journal of Mathema-tics of Computation,1987,48(177):203-209 [5] Boneh D,Franklin M K.Identity-based encryption from the Weil pairing[C]∥Proceedings of the Crypto’01,LNCS.vol.2139,Springer-Verlag,2001:213-229 [6] Al-Riyami S,Paterson K.Certificateless public key cryptography[C]∥Proceedings of the Asiacrypt’03,LNCS.vol.2894,Springer-Verlag,2003:452-473 [7] Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs and their applications[C]∥Proceedings of the Eurocrypt’96,LNCS.vol.1070,Springer-Verlag,1996:143-154 [8] Yang M,Shem X-Q,Wang Y-M.Certificateless universal designated verifier signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-94 [9] Guozheng H,Fan H.Attacks against two provably secure certifi-cateless signature schemes[C]∥Proceedings of the WASE International Conference on Information Engineering.2009:246-249 [10] Huang X,Susilo W,Mu Y,et al.Certificateless designated verifier signature schemes[C]∥Proceedings of the 20th International Conference on AINA’06.vol.2,2006:15-19 [11] Du H,Wen Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings.Cryptology ePrint Archive[R].Report 2007/250 [12] Chen H,Song R,Zhang F,et al.An efficient certificateless short designated verifier signature scheme[C]∥Proceedings of the International Conference on WiCOM’08.Dalian,2008:1-6 [13] Fan C-I,Hsu R-H,Ho P-H.Cryptanalysis on Du-Wen certifi-cateless short signature scheme[C]∥Proceedings of the JWIS’09,Institute of Electrical and Electronics Engineers.Kaohsiung,2009:1-7 [14] Tso R,Yi X,Huang X.Efficient and short certificateless signatures secure against realistic adversaries[J].Journal of Supercomputer,2011,55:173-191 [15] Choi K Y,Park J H,Lee D H.A new provably secure certificateless short signature scheme[J].Computers and Mathematics with Applications,2011,61(7):1760-1768 [16] Tian M,Huang L,Yang W.On the security of a certificateless short signature scheme.Cryptology ePrint Archive.http://eprint.iacr.org/2011/419,2011 [17] Hafizul Islam S K,Biswas G P.Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings[J].Journal of King Saud University-Computer and Information Sciences,2013,25(1):51-61 [18] Boneh D,Lynn B,Shacham H.Short Signature from the Weil Paring[C]∥Proceeding of Asiacrypt’01,LNCS 2248.Springer-Verlag,2001:514-532 |
No related articles found! |
|