计算机科学 ›› 2021, Vol. 48 ›› Issue (6A): 529-532.doi: 10.11896/jsjkx.200700049

• 信息安全 • 上一篇    下一篇

改进的具有前向安全性的无证书代理盲签名方案

姜昊堃, 董学东, 张成   

  1. 大连大学信息工程学院 辽宁 大连116622
  • 出版日期:2021-06-10 发布日期:2021-06-17
  • 通讯作者: 董学东(dongxuedong@sina.com)
  • 作者简介:haokun_jiang@126.com
  • 基金资助:
    国家自然科学基金(11401068)

Improved Certificateless Proxy Blind Signature Scheme with Forward Security

JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng   

  1. College of Information Engineering,Dalian University,Dalian,Liaoning 116622,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:JIANG Hao-kun,born in 1995,postgraduate.His main research interests include cyberspace security and so on.
    DONG Xue-dong,born in 1961,professor.His main research interests include cyberspace security and so on.
  • Supported by:
    National Natural Science Foundation of China(11401068).

摘要: 通过对文献[8]提出的一种基于无证书的前向安全代理盲签名方案进行安全性分析发现,其方案无法抵抗恶意且消极KGC的公钥替换攻击,且该方案不满足不可否认性。针对以上问题,提出了一个改进方案,在用户密钥生成方式上做出了改进,通过单向哈希函数将用户公钥嵌入到部分私钥中,进而约束KGC生成的部分私钥,使得敌手无法伪造出合法密钥对进而冒充原始签名者进行授权。在代理盲签名阶段由消息拥有者的秘密值取代一个盲化因子,不仅能够减小计算量,而且消息拥有者也无法否认曾提供过该消息。安全性分析表明,改进方案能够抵抗恶意且消极KGC的公钥替换攻击并且满足不可否认性。效率分析表明,改进方案比原方案的计算效率更高。

关键词: 不可否认性, 代理盲签名, 公钥替换攻击, 前向安全性, 强盲性, 数字签名, 无证书密码体制

Abstract: Through a security analysis of a certificateless forward security proxy blind signature scheme proposed by reference [8],this paper points out that its scheme cannot resist malicious and negative KGC public key replacement attacks,and the scheme does not satisfy non-repudiation.In view of the above problems,an improved scheme is proposed to improve the user key generation method.The one-way hash function is used to embed the user public key into part of the private key,thereby restricting the part of the private key generated by KGC,so that the adversary cannot forge Authorize by signing the legal key to impersonate the original signer.In the proxy blind signature phase,the secret value of the message owner replaces a blinding factor,which not only reduces the amount of calculation,but also the message owner cannot deny that the message was provided.Security analysis shows that the improved scheme can resist malicious and passive KGC public key replacement attacks and satisfy non-repudiation.The efficiency analysis shows that the improved scheme is more efficient than the original scheme.

Key words: Certificateless cryptosystem, Digital signature, Forward security, Non-repudiation, Proxy blind signature, Public-key replacement attack, Strong blindness

中图分类号: 

  • TP309
[1] LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Illinois,USA,2000:273-277.
[2] TAN Z.An E-Cash Scheme Based on Proxy Blind Signaturefrom Bilinear Pairings[J].JCP,2010,5:1638-1645.
[3] QI Y J,JI W L.Scheme of threshold proxy blind signature[J].Modern Electronics Technique,2012,35(9):70-72.
[4] LIU J,LIU J,QIU X.A proxy blind signature scheme and an off-line electronic cash scheme[J].Wuhan University Journal of Natural Sciences,2013,18(2):117-125.
[5] LIU E G,WANG X,ZHOU H J,et al.Improved certificateless proxy blind signature schema[J].Computer Science,2016,43(8):92-94.
[6] VERMA G K,SINGH B B.Efficient message recovery proxy blind signature scheme from pairings[J].Transactions on Emerging Telecommunications Technologies,2017,28(11):16-24.
[7] WANG X W,HOU S H.Improved efficient proxy blind signature scheme[J].Computer Science,2019,46(S1):358-361.
[8] LIAO X P.A forward-secure proxy blind signature schemebased on certificateless cryptosystem[J].Modern Electronics Technique,2019,42(1):91-94.
[9] ZHU X F,LIANG L.Identity based proxy blind signature and its application research in e-cash[J].The Journal of Shandong Agriculture and Engineering University,2020,37(2):25-26.
[10] WU T,JING X J.Cryptanalysis and improvement of a certifi-cateless signature scheme with strong unforgeability[J].Acta Electronica Sinica,2018,46(3):602-606.
[11] ZUO L M,CHEN Z S,XIA P P,et al.Improved efficient certificateless short signature schema[J].Computer Science,2019,46(4):172-176.
[12] DONG X D,HAN S,ZHANG C.A new paillier digital signature scheme based on cubic residues[J].Computer Engineering and Applications,2020,56(18):77-81.
[1] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[2] 代闯闯, 栾海晶, 杨雪莹, 过晓冰, 陆忠华, 牛北方.
区块链技术研究综述
Overview of Blockchain Technology
计算机科学, 2021, 48(11A): 500-508. https://doi.org/10.11896/jsjkx.201200163
[3] 张君何, 周清雷, 韩英杰.
一种基于环签名和短签名的可净化签名方案
Sanitizable Signature Scheme Based on Ring Signature and Short Signature
计算机科学, 2020, 47(6A): 386-390. https://doi.org/10.11896/JsJkx.190500061
[4] 赵楠,章国安.
VANET中基于无证书环签密的可认证隐私保护方案
Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET
计算机科学, 2020, 47(3): 312-319. https://doi.org/10.11896/jsjkx.190100115
[5] 江泽涛, 徐娟娟.
云环境下基于代理盲签名的高效异构跨域认证方案
Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment
计算机科学, 2020, 47(11): 60-67. https://doi.org/10.11896/jsjkx.191100068
[6] 左黎明,陈兰兰.
基于身份标识的特殊数字签名方案及其应用
Special Digital Signature Scheme Based on Identity Identification and Its Application
计算机科学, 2020, 47(1): 309-314. https://doi.org/10.11896/jsjkx.181202416
[7] 刘亚强,李晓宇.
利用基于身份的密码算法+短信验证码的移动安全支付方案
Mobile Secure Payment Scheme Using Identity-based Cryptographic Algorithm+SMS Verification Code
计算机科学, 2020, 47(1): 293-301. https://doi.org/10.11896/jsjkx.181202414
[8] 王兴威, 侯书会.
一种改进的高效的代理盲签名方案
Improved Efficient Proxy Blind Signature Scheme
计算机科学, 2019, 46(6A): 358-361.
[9] 左黎明, 陈祚松, 夏萍萍, 汤鹏志, 康文洋.
一种改进的高效无证书短签名方案
Improved Efficient Certificateless Short Signature Scheme
计算机科学, 2019, 46(4): 172-176. https://doi.org/10.11896/j.issn.1002-137X.2019.04.027
[10] 郭利娟, 吕晓琳.
线性拓扑结构的乐观认证邮件
Optimistic Certified Email for Line Topology
计算机科学, 2018, 45(8): 156-159. https://doi.org/10.11896/j.issn.1002-137X.2018.08.028
[11] 韦性佳,张京花,刘增芳,芦殿军.
具有前向安全性质的基于身份的聚合签名方案
Identity Based Aggregate Signature Scheme with Forward Security
计算机科学, 2018, 45(6A): 387-391.
[12] 李磊,贾惠文,班学华,何宇帆.
基于混淆的广播多重签名方案
Obfuscation-based Broadcasting Multi-signature Scheme
计算机科学, 2017, 44(Z11): 329-333. https://doi.org/10.11896/j.issn.1002-137X.2017.11A.069
[13] 马潇潇,于刚.
可公开定责的密文策略属性基加密方案
Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme
计算机科学, 2017, 44(5): 160-165. https://doi.org/10.11896/j.issn.1002-137X.2017.05.028
[14] 叶君耀,郑东,任方.
改进的具有轻量级结构的Veron身份认证及数字签名方案
Improved Veron’s Identification with Lightweight Structure and Digital Signature Scheme
计算机科学, 2017, 44(3): 168-174. https://doi.org/10.11896/j.issn.1002-137X.2017.03.037
[15] 刘二根,王霞,周华静,郭红丽.
改进的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme
计算机科学, 2016, 43(8): 92-94. https://doi.org/10.11896/j.issn.1002-137X.2016.08.019
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!