计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 126-128.

• 信息安全 • 上一篇    下一篇

一个无证书强指定验证者签名方案的安全性分析与改进

刘唐,汪小芬,丁雪峰   

  1. 四川师范大学基础教学学院 成都610068;四川大学计算机学院 成都610065;电子科技大学计算机科学与工程学院 成都611731;四川大学信息管理中心 成都610065
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受四川省科技支撑计划项目(2012GZ0001),四川师范大学科研项目(13KYL06),上海市科学技术委员会基金项目(11511505300)资助

Security Analysis and Improvement of Certificateless Strong Designated Verifier Signature Scheme

LIU Tang,WANG Xiao-fen and DING Xue-feng   

  • Online:2018-11-16 Published:2018-11-16

摘要: Hafizul Islam SK 和 G.P.Biswas最近基于椭圆曲线双线性对提出一个无证书强指定验证者签名方案,并声称该方案在三类敌手攻击模型下是可证明安全的,即第一类只得到系统公开参数和公钥的敌手,第二类可替换签名和验证者公钥的敌手,第三类可得到系统主密钥的敌手。分析该强指定验证者签名方案不能抵抗第三类敌手的攻击,亦即第三类敌手可以伪造有效的签名。针对此缺陷,对该无证书强指定验证者签名方案做了改进,在改进方案中,验证者的秘密私钥(由参与者独立产生的私钥)参与签名的验证计算,因此有效避免了原有方案的安全缺陷。最后对改进方案作了安全性分析,说明改进方案确实能抵抗三类敌手的攻击。

关键词: 无证书的公钥密码系统,强指定验证者签名,双线性对 中图法分类号TP918.1文献标识码A

Abstract: Hafizul Islam SK and G.P.Biswas recently proposed a certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairing,and claimed their scheme satisfies provable security against three types of adversaries,including the type 1adversary who only learns the system public parameters,the type 2adversary who can’t obtain the private key of the user and the system master key,but can replace the user’s public key,and the type 3adversary who has obtained the system master key.However,this paper pointed out their signature scheme is actually not secure as claimed by presenting an attack launched by an adversary who has learned the system master key.Furthermore,to make up this flaw,we also provided an revised certificateless strong designated verifier signature scheme in which the verifier’s partial private key generated by himself is included in the computation of the verification procedure,thus above attack can be efficiently resisted.

Key words: Certificateless public key cryptosystem,Strong designated verifier signature,Bilinear pairing

[1] Diffie W,Hellman M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654
[2] Shamir A.Identity based cryptosystems and signature scheme[C]∥Crypto 1984,LNCS.vol.196,Springer-Verlag,1984:47-53
[3] Miller V S.Use of elliptic curves in cryptography[C]∥Procee-ding of the Crypto’85.New York:Springer-Verlag,1985:417-426
[4] Koblitz N.Elliptic curve cryptosystem[J].Journal of Mathema-tics of Computation,1987,48(177):203-209
[5] Boneh D,Franklin M K.Identity-based encryption from the Weil pairing[C]∥Proceedings of the Crypto’01,LNCS.vol.2139,Springer-Verlag,2001:213-229
[6] Al-Riyami S,Paterson K.Certificateless public key cryptography[C]∥Proceedings of the Asiacrypt’03,LNCS.vol.2894,Springer-Verlag,2003:452-473
[7] Jakobsson M,Sako K,Impagliazzo R.Designated verifier proofs and their applications[C]∥Proceedings of the Eurocrypt’96,LNCS.vol.1070,Springer-Verlag,1996:143-154
[8] Yang M,Shem X-Q,Wang Y-M.Certificateless universal designated verifier signature scheme[J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-94
[9] Guozheng H,Fan H.Attacks against two provably secure certifi-cateless signature schemes[C]∥Proceedings of the WASE International Conference on Information Engineering.2009:246-249
[10] Huang X,Susilo W,Mu Y,et al.Certificateless designated verifier signature schemes[C]∥Proceedings of the 20th International Conference on AINA’06.vol.2,2006:15-19
[11] Du H,Wen Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings.Cryptology ePrint Archive[R].Report 2007/250
[12] Chen H,Song R,Zhang F,et al.An efficient certificateless short designated verifier signature scheme[C]∥Proceedings of the International Conference on WiCOM’08.Dalian,2008:1-6
[13] Fan C-I,Hsu R-H,Ho P-H.Cryptanalysis on Du-Wen certifi-cateless short signature scheme[C]∥Proceedings of the JWIS’09,Institute of Electrical and Electronics Engineers.Kaohsiung,2009:1-7
[14] Tso R,Yi X,Huang X.Efficient and short certificateless signatures secure against realistic adversaries[J].Journal of Supercomputer,2011,55:173-191
[15] Choi K Y,Park J H,Lee D H.A new provably secure certificateless short signature scheme[J].Computers and Mathematics with Applications,2011,61(7):1760-1768
[16] Tian M,Huang L,Yang W.On the security of a certificateless short signature scheme.Cryptology ePrint Archive.http://eprint.iacr.org/2011/419,2011
[17] Hafizul Islam S K,Biswas G P.Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings[J].Journal of King Saud University-Computer and Information Sciences,2013,25(1):51-61
[18] Boneh D,Lynn B,Shacham H.Short Signature from the Weil Paring[C]∥Proceeding of Asiacrypt’01,LNCS 2248.Springer-Verlag,2001:514-532

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!