计算机科学 ›› 2019, Vol. 46 ›› Issue (4): 172-176.doi: 10.11896/j.issn.1002-137X.2019.04.027

• 信息安全 • 上一篇    下一篇

一种改进的高效无证书短签名方案

左黎明1,2, 陈祚松1,2, 夏萍萍1,2, 汤鹏志1, 康文洋1,2   

  1. 华东交通大学理学院 南昌3300131
    华东交通大学系统工程与密码学研究所 南昌3300132
  • 收稿日期:2018-03-21 出版日期:2019-04-15 发布日期:2019-04-23
  • 通讯作者: 左黎明(1981-),男,硕士,副教授,CCF会员,主要研究方向为信息安全、非线性系统,E-mail:limingzuo@126.com(通信作者)
  • 作者简介:陈祚松(1993-),男,硕士生,主要研究方向为信息安全;夏萍萍(1995-),女,硕士生,主要研究方向为信息安全;汤鹏志(1961-),男,硕士,教授,主要研究方向为信息安全;康文洋(1993-),男,硕士生,主要研究方向为信息安全。
  • 基金资助:
    本文受国家自然科学基金资助项目(11361024),江西省自然科学基金项目(20171BAB201009),江西省教育厅科技项目(GJJ161417,GJJ170386),江西省研究生创新专项资金项目(YC2017-S257)资助。

Improved Efficient Certificateless Short Signature Scheme

ZUO Li-ming1,2, CHEN Zuo-song1,2, XIA Ping-ping1,2, TANG Peng-zhi1, KANG Wen-yang1,2   

  1. School of Science,East China Jiaotong University,Nanchang 330013,China1
    SEC Institute,East China Jiaotong University,Nanchang 330013,China2
  • Received:2018-03-21 Online:2019-04-15 Published:2019-04-23

摘要: 无证书密码体制解决了PKI(Public Key Infrastructure)证书密码体制中证书的存储和管理问题,同时有效地解决了基于身份的密码系统中的密钥托管问题,一直是密码学研究中的一个热点。鉴于传统的无证书数字签名方案容易遭受公钥替换攻击的问题,对传统的无证书数字签名的定义进行了改进,并在此基础上提出了一种基于新定义的无证书短签名方案。在Inv-CDH(Inverse Computational Diffie-Hellman)困难问题假设和随机预言机模型下证明了方案的安全性,随后对方案进行了实现。最后对所提方案与几种经典方案进行了效率分析和实验比较,结果表明所提方案的计算量小,效率较高,适用于计算能力和传输能力较弱的应用场景。

关键词: 短签名, 随机预言机模型, 无证书密码体制

Abstract: Certificateless public key cryptography has always been a hot topic in cryptography research,which solves not only the problem of storing and managing certificates in the PKI (public key infrastructure) certificate cryptosystem but also the key escrow problem in the identity-based cryptography system.Aiming at the problem that the traditional certificateless digital signature scheme is susceptiable to the public key substitute attacks,the definition of traditional certificateless digital signature was improved,and a short signature scheme based on the new definition was proposed.It was proved that the scheme is secure under the difficult problem of Inv-CDH (inverse computational Diffie-Hellman) and random oracle model,and the scheme was implemented.Finally,efficiency analysis and experiment comparison with several classic schemes were carried out.The result shows that the scheme has low computational complexity and high efficiency,and is suitable for application scenarios with weak computing capability and transmitting capability.

Key words: Certificateless PKC, Random oracle model, Short signature

中图分类号: 

  • TP309.7
[1]SHAMIR A.Identity-based cryptosystems and signature sche- mes[C]∥Workshop on the theory and application of cryptographic techniques.Berlin Heidelberg:Springer,1984:47-53.
[2]AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]∥International Conference on the Theory and Application of Cryptology and Information Security.Berlin Heidelberg:Springer,2003:452-473.
[3]DU H,WEN Q.Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standards & Interfaces,2009,31(2):390-394.
[4]ISLAM S K H,BISWAS G P.Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography[J].International Journal of Computer Mathematics,2013,90(11):2244-2258.
[5]HORNG S J,TZENG S F,HUANG P H,et al.An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks[J].Information Sciences,2015,317(C):48-66.
[6]DU H Z.A Secure and Efficient Certificateless Signature Scheme in the Standard Model[C]∥ The International Con-ference on Computer Science and Technology.Singapore:World Scientific,2017:278-286.
[7]KARATI A,ISLAM S H,KARUPPIAH M.Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments[J].IEEE Transactions on Industrial Informatics,2018,PP(99):1-1.
[8]TSAI J L,LO N W,WU T C.Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings[J].International Journal of Communication Systems,2014,27(7):1083-1090.
[9]LIU E G,WANG X,ZHOU H J,et al.Improved Certificateless Proxy Blind Signature Scheme[J].Computer Science,2016,43(8):92-94.(in Chinese) 刘二根,王霞,周华静,等.改进的无证书代理盲签名方案[J].计算机科学,2016,43(8):92-94.
[10]CHANG S,LEE H S,LEE J,et al.Security Analysis of a Certificateless Signature from Lattices[J/OL].http://www.hidawi.com/journals/scn/2017/3413567/.
[11]GONG P,LI P.Further improvement of a certificateless signature scheme without pairing[J].International Journal of Communication Systems,2015,27(10):2083-2091.
[12]BHATIA T,VERMA A K.Cryptanalysis and improvement of certificateless proxy signcryption scheme for eprescription system in mobile cloud computing[J].Annals of Telecommunications,2017,72(9-10):563-576.
[13]LI J,YUAN H,ZHANG Y.Cryptanalysis and Improvement for Certificateless Aggregate Signature[J].Fundamenta Informaticae,2018,157(1-2):111-123.
[14]HU X M,LIU Y,XU H J,et al.Analysis and Improvement of Two Certificateless Signature Scheme[J].Journal of Chinese Computer Systems,2016,37(10):2264-2268.
[15]ZHANG L,ZHANG F T.A Method to Constr-uct a Class of Certificateless Signature Schemes [J].Chinese Journal of Computers,2009,32(5):940-945.
[16]LI X,CHEN K,SUN L.Certificateless signatu-re and proxy signature schemes from bilinear pairin-gs[J].Lithuanian Mathematical Journal,2005,45(1):76-83.
[17]YAP W S,HENG S H,GOI B M.An efficient certificateless signature scheme[C]∥International Conference on Embedded and Ubiquitous Computing.Berlin Heidelberg:Springer,2006:322-331.
[18]GORANTLA M C,SAXENA A.An efficient certificateless signature scheme[C]∥Computational Intelligence and Security.Berlin Heidelberg:Springer,2005:110-116.
[19]ZHANF Y Q,LU W L,TANG C M.Research on An Efficient and Practical Cloud-based Digital Signature Scheme[J].Netinfo Security,2016,2016(7):1-6.
[1] 姜昊堃, 董学东, 张成.
改进的具有前向安全性的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme with Forward Security
计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049
[2] 叶胜男, 陈建华.
一个强安全的无证书签名方案的分析和改进
Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme
计算机科学, 2021, 48(10): 272-277. https://doi.org/10.11896/jsjkx.201200117
[3] 张君何, 周清雷, 韩英杰.
一种基于环签名和短签名的可净化签名方案
Sanitizable Signature Scheme Based on Ring Signature and Short Signature
计算机科学, 2020, 47(6A): 386-390. https://doi.org/10.11896/JsJkx.190500061
[4] 赵楠,章国安.
VANET中基于无证书环签密的可认证隐私保护方案
Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET
计算机科学, 2020, 47(3): 312-319. https://doi.org/10.11896/jsjkx.190100115
[5] 孙凌,田源,黄后彪.
航空移动自组网中簇间节点密钥协商方案
Nodes Key Agreement Scheme between Clusters in Aeronautical Mobile Ad hoc Network
计算机科学, 2014, 41(Z6): 369-373.
[6] 周才学,谭旭杰.
基于证书的多代理多签名
Certificate-based Multi-proxy Multi-signature Scheme
计算机科学, 2014, 41(Z11): 272-276.
[7] 王电钢,丁雪峰,黄昆.
不含双线性对的无证书签密方案安全性分析与改进
Security Analysis and Improvement of Strongly Secure Certificateless Key Agreement Protocol
计算机科学, 2013, 40(Z11): 203-209.
[8] 刘庆华,宋余庆,刘毅.
一种高效的无证书内容可提取签名算法
Efficient Content Extraction Signature Scheme without Certification
计算机科学, 2013, 40(8): 136-139.
[9] 付小晶,张国印,马春光.
一个改进的动态门限基于属性签名方案
Dynamic Threshold Attributes-based Signature Scheme
计算机科学, 2013, 40(7): 93-97.
[10] 李超零,陈越,王成良,李文俊,王双进.
基于身份的代理重签名广播签密方案
Identity-based Broadcast Signcryption with Proxy Re-signature
计算机科学, 2013, 40(5): 153-157.
[11] 周才学.
无可信中心的基于身份的广义签密
ID-based Generalized Signcryption without Trusted Party
计算机科学, 2013, 40(4): 142-146.
[12] 孙华,郑雪峰.
一种可证明安全的有效无证书签密方案
Provably Secure and Efficient Certificateless Signcryption Scheme
计算机科学, 2013, 40(11): 112-116.
[13] 周才学,王飞鹏.
改进的无双线性对的无证书签密方案
Improved Certificateless Signcryption Scheme without Pairing
计算机科学, 2013, 40(10): 139-143.
[14] 张应辉,马华,王保仓.
EDL签名中可证明安全的阈下信道封闭协议
Provably Secure Subliminal-free Protocol in EDL Digital Signature
计算机科学, 2010, 37(9): 72-74.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!