计算机科学 ›› 2021, Vol. 48 ›› Issue (6A): 529-532.doi: 10.11896/jsjkx.200700049

• 信息安全 • 上一篇    下一篇


姜昊堃, 董学东, 张成   

  1. 大连大学信息工程学院 辽宁 大连116622
  • 出版日期:2021-06-10 发布日期:2021-06-17
  • 通讯作者: 董学东(dongxuedong@sina.com)
  • 作者简介:haokun_jiang@126.com
  • 基金资助:

Improved Certificateless Proxy Blind Signature Scheme with Forward Security

JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng   

  1. College of Information Engineering,Dalian University,Dalian,Liaoning 116622,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:JIANG Hao-kun,born in 1995,postgraduate.His main research interests include cyberspace security and so on.
    DONG Xue-dong,born in 1961,professor.His main research interests include cyberspace security and so on.
  • Supported by:
    National Natural Science Foundation of China(11401068).

摘要: 通过对文献[8]提出的一种基于无证书的前向安全代理盲签名方案进行安全性分析发现,其方案无法抵抗恶意且消极KGC的公钥替换攻击,且该方案不满足不可否认性。针对以上问题,提出了一个改进方案,在用户密钥生成方式上做出了改进,通过单向哈希函数将用户公钥嵌入到部分私钥中,进而约束KGC生成的部分私钥,使得敌手无法伪造出合法密钥对进而冒充原始签名者进行授权。在代理盲签名阶段由消息拥有者的秘密值取代一个盲化因子,不仅能够减小计算量,而且消息拥有者也无法否认曾提供过该消息。安全性分析表明,改进方案能够抵抗恶意且消极KGC的公钥替换攻击并且满足不可否认性。效率分析表明,改进方案比原方案的计算效率更高。

关键词: 不可否认性, 代理盲签名, 公钥替换攻击, 前向安全性, 强盲性, 数字签名, 无证书密码体制

Abstract: Through a security analysis of a certificateless forward security proxy blind signature scheme proposed by reference [8],this paper points out that its scheme cannot resist malicious and negative KGC public key replacement attacks,and the scheme does not satisfy non-repudiation.In view of the above problems,an improved scheme is proposed to improve the user key generation method.The one-way hash function is used to embed the user public key into part of the private key,thereby restricting the part of the private key generated by KGC,so that the adversary cannot forge Authorize by signing the legal key to impersonate the original signer.In the proxy blind signature phase,the secret value of the message owner replaces a blinding factor,which not only reduces the amount of calculation,but also the message owner cannot deny that the message was provided.Security analysis shows that the improved scheme can resist malicious and passive KGC public key replacement attacks and satisfy non-repudiation.The efficiency analysis shows that the improved scheme is more efficient than the original scheme.

Key words: Certificateless cryptosystem, Digital signature, Forward security, Non-repudiation, Proxy blind signature, Public-key replacement attack, Strong blindness


  • TP309
[1] LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Illinois,USA,2000:273-277.
[2] TAN Z.An E-Cash Scheme Based on Proxy Blind Signaturefrom Bilinear Pairings[J].JCP,2010,5:1638-1645.
[3] QI Y J,JI W L.Scheme of threshold proxy blind signature[J].Modern Electronics Technique,2012,35(9):70-72.
[4] LIU J,LIU J,QIU X.A proxy blind signature scheme and an off-line electronic cash scheme[J].Wuhan University Journal of Natural Sciences,2013,18(2):117-125.
[5] LIU E G,WANG X,ZHOU H J,et al.Improved certificateless proxy blind signature schema[J].Computer Science,2016,43(8):92-94.
[6] VERMA G K,SINGH B B.Efficient message recovery proxy blind signature scheme from pairings[J].Transactions on Emerging Telecommunications Technologies,2017,28(11):16-24.
[7] WANG X W,HOU S H.Improved efficient proxy blind signature scheme[J].Computer Science,2019,46(S1):358-361.
[8] LIAO X P.A forward-secure proxy blind signature schemebased on certificateless cryptosystem[J].Modern Electronics Technique,2019,42(1):91-94.
[9] ZHU X F,LIANG L.Identity based proxy blind signature and its application research in e-cash[J].The Journal of Shandong Agriculture and Engineering University,2020,37(2):25-26.
[10] WU T,JING X J.Cryptanalysis and improvement of a certifi-cateless signature scheme with strong unforgeability[J].Acta Electronica Sinica,2018,46(3):602-606.
[11] ZUO L M,CHEN Z S,XIA P P,et al.Improved efficient certificateless short signature schema[J].Computer Science,2019,46(4):172-176.
[12] DONG X D,HAN S,ZHANG C.A new paillier digital signature scheme based on cubic residues[J].Computer Engineering and Applications,2020,56(18):77-81.
[1] 任畅, 赵洪, 蒋华.
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[2] 代闯闯, 栾海晶, 杨雪莹, 过晓冰, 陆忠华, 牛北方.
Overview of Blockchain Technology
计算机科学, 2021, 48(11A): 500-508. https://doi.org/10.11896/jsjkx.201200163
[3] 张君何, 周清雷, 韩英杰.
Sanitizable Signature Scheme Based on Ring Signature and Short Signature
计算机科学, 2020, 47(6A): 386-390. https://doi.org/10.11896/JsJkx.190500061
[4] 赵楠,章国安.
Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET
计算机科学, 2020, 47(3): 312-319. https://doi.org/10.11896/jsjkx.190100115
[5] 江泽涛, 徐娟娟.
Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment
计算机科学, 2020, 47(11): 60-67. https://doi.org/10.11896/jsjkx.191100068
[6] 左黎明,陈兰兰.
Special Digital Signature Scheme Based on Identity Identification and Its Application
计算机科学, 2020, 47(1): 309-314. https://doi.org/10.11896/jsjkx.181202416
[7] 刘亚强,李晓宇.
Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code
计算机科学, 2020, 47(1): 293-301. https://doi.org/10.11896/jsjkx.181202414
[8] 王兴威, 侯书会.
Improved Efficient Proxy Blind Signature Scheme
计算机科学, 2019, 46(6A): 358-361.
[9] 左黎明, 陈祚松, 夏萍萍, 汤鹏志, 康文洋.
Improved Efficient Certificateless Short Signature Scheme
计算机科学, 2019, 46(4): 172-176. https://doi.org/10.11896/j.issn.1002-137X.2019.04.027
[10] 郭利娟, 吕晓琳.
Optimistic Certified Email for Line Topology
计算机科学, 2018, 45(8): 156-159. https://doi.org/10.11896/j.issn.1002-137X.2018.08.028
[11] 韦性佳,张京花,刘增芳,芦殿军.
Identity Based Aggregate Signature Scheme with Forward Security
计算机科学, 2018, 45(6A): 387-391.
[12] 李磊,贾惠文,班学华,何宇帆.
Obfuscation-based Broadcasting Multi-signature Scheme
计算机科学, 2017, 44(Z11): 329-333. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.069
[13] 马潇潇,于刚.
Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme
计算机科学, 2017, 44(5): 160-165. https://doi.org/10.11896/j.issn.1002-137X.2017.05.028
[14] 叶君耀,郑东,任方.
Improved Veron’s Identification with Lightweight Structure and Digital Signature Scheme
计算机科学, 2017, 44(3): 168-174. https://doi.org/10.11896/j.issn.1002-137X.2017.03.037
[15] 刘二根,王霞,周华静,郭红丽.
Improved Certificateless Proxy Blind Signature Scheme
计算机科学, 2016, 43(8): 92-94. https://doi.org/10.11896/j.issn.1002-137X.2016.08.019
Full text



No Suggested Reading articles found!