计算机科学 ›› 2021, Vol. 48 ›› Issue (10): 272-277.doi: 10.11896/jsjkx.201200117
所属专题: 密码学 虚拟专题
叶胜男, 陈建华
YE Sheng-nan, CHEN Jian-hua
摘要: 无证书公钥密码体制结合了基于身份的密码体制和传统PKI公钥密码体制的优势,克服了基于身份的公钥密码体制的密钥托管问题及PKI系统的证书管理问题,具有明显的优势。对Hassouna等提出的一个强安全无证书签名方案进行安全分析。结果表明,该方案不能验证消息的完整性,存在消息篡改攻击,且方案未使用根据系统主密钥生成的私钥进行签名,所以不是无证书签名方案。在此基础上,提出了一个改进的无证书签名方案,在随机预言机模型下,基于椭圆曲线Diffie-Hellman问题假设,证明了该方案可以抵抗第一类强敌手和第二类敌手的攻击,满足存在性不可伪造的安全性。
中图分类号:
[1]SHAMIR A.Identity-Based Cryptosystems and SignatureSchemes[C]//Workshop on the Theory & Application of Cryptographic Techniques.Berlin:Springer,1984. [2]BARRETO P S L M,KIM H Y,LYNN B,et al.Efficient Algorithms for Pairing-Based Cryptosystems[C]//International Cryptology Conference on Advances in Cryptology.Berlin:Springer,2002. [3]BARRETO P,LYNN B,SCOTT M.Constructing EllipticCurves with Prescribed Embedding Degrees[C]//Springer Berlin Heidelberg.Berlin:Springer, 2003. [4]BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil Pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2001. [5]HESS F.Efficient Identity Based Signature Schemes Based on Pairings[C]//International Workshop on Selected Areas in Cryptography.Berlin:Springer, 2003. [6]RIYAMI S S,PATERSON K G.Certificateless Public KeyCryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003. [7]DENT A W,BENOÎT L,PATERSON K G.Certificateless encryption schemes strongly secure in the standard model[C]//Public Key Cryptography-PKC 2008,11th International Workshop on Practice and Theory in Public-Key Cryptography,Barcelona,Spain,2008.Berlin:Springer,2008. [8]VIVEK S S,SELVI S S D,RANGAN C P.CCA2 Secure Certificateless Encryption Schemes Based on RSA[C]//International Conference on Security & Cryptography.IEEE,2014. [9]WANG C,HUANG H,TANG Y.An Efficient CertificatelessSignature from Pairings[C]//International Symposium on Data.IEEE,2007. [10]XIONG H,QIN Z,LI F.An Improved Certificateless Signature Scheme Secure in the Standard Model[J].Fundamenta Informa-ticae,2008,88(1):193-206. [11]ZHANG L,ZHANG F.A New Provably Secure Certificateless Signature Scheme[C]//IEEE International Conference on Communications.IEEE,2008. [12]SHIM K A.Forgery Attacks on Two Provably Secure Certificateless Signature Schemes[J].Information Sciences,2020,521:81-87. [13]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692. [14]HUANG L,ZHOU J,ZHANG G,et al.Certificateless PublicVerification for the Outsourced Data Integrity in Cloud Storage[J].Journal of Circuits,Systems and Computers,2018,27(11):1850181.1-1850181.17. [15]YANG X D,WANG M D,PEI X Z,et al.Security Analysis and Improvement of a Certificateless Signature Scheme in theStan-dard Model[J].Acta Electronica Sinica,2019,47(9):1972-1978. [16]DU H Z,WEN Q Y,ZHANG S S,et al.A new provably secure certificateless signature scheme for Internet of Things[J].Ad Hoc Networks,2019,100:102074. [17]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692. [18]SELVI S S D,VIVEK S S,RANGAN C P.Certificateless KEM and Hybrid Signcryption Schemes Revisited[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2010. [19]XIE W,ZHANG Z.Certificateless signcryption without pairing[J/OL].IACR Cryptology ePrint Archive,2010,187.https://www.researchgate.net/publication/220336349_Certificateless_Signcryption_without_Pairing. [20]XIE W,ZHANG Z.Efficient and provably secure certificateless signcryption from bilinear maps[C]//IEEE International Conference on Wireless Communications.IEEE,2010. [21]HASSOUNA M,BASHIER E,BARRY B.A Short Certificateless Digital Signature Scheme[C]//International Conference of Digital Information Processing,Data Mining and Wireless Communications.2015. [22]HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945. [23]HUANG X,MU Y,SUSILO W,et al.Certificateless Signature Revisited[C]//Australasian Conference on Information Security &Privacy.Springer-Verlag,2007. [24]ZHANG Z,WONG D S,XU J,et al.Certificateless Public-Key Signature:Security Model and Efficient Construction[C]//International Conference on Applied Cryptography & Network Security.Springer-Verlag,2006. [25]CHEN J S,HUANG Z J.Efficient certificbased signature schenle[J].Computer Engineering Applications,2012,48(30):98-102. [26]LIU J K, BAEK J, SUSILO W,et al.Certificate-Based Signature Schemes without Pairings or Random Oracles[C]//Information Security,International Conference,Isc,Taipei,Taiwan,September.Berlin:Springer,2008. [27]MING Y,WANG Y M.Efficient Certificateless SignatureScheme Based on Bilinear Pairings[J].Journal of University of Electronic Science and Technology of China,2008,37(2):175-177. |
[1] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[2] | 刘帅, 陈建华. 无双线性对的无证书签名方案及其在配电网中的应用 Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network 计算机科学, 2020, 47(9): 304-310. https://doi.org/10.11896/jsjkx.200500002 |
[3] | 张浩, 蔡英, 夏红科. VANET中基于RSU辅助签名环形成的方案 RSU-based Assisting Ring Formation Scheme in VANET 计算机科学, 2020, 47(5): 301-305. https://doi.org/10.11896/jsjkx.190400119 |
[4] | 左黎明, 陈祚松, 夏萍萍, 汤鹏志, 康文洋. 一种改进的高效无证书短签名方案 Improved Efficient Certificateless Short Signature Scheme 计算机科学, 2019, 46(4): 172-176. https://doi.org/10.11896/j.issn.1002-137X.2019.04.027 |
[5] | 韦性佳,张京花,刘增芳,芦殿军. 具有前向安全性质的基于身份的聚合签名方案 Identity Based Aggregate Signature Scheme with Forward Security 计算机科学, 2018, 45(6A): 387-391. |
[6] | 丁庆洋,王秀利,朱建明,宋彪. 基于区块链的信息物理融合系统的信息安全保护框架 Information Security Framework Based on Blockchain for Cyber-physics System 计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006 |
[7] | 胡小明,马闯,斯桃枝,蒋文蓉,许华杰,谭文安. 改进的无证书广义指定验证者聚合签名方案 Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier 计算机科学, 2017, 44(8): 168-175. https://doi.org/10.11896/j.issn.1002-137X.2017.08.030 |
[8] | 郑培真,苑春春,刘超,吴际,杨海燕,胡宁. 面向软件安全性需求分析过程的追踪模型 Traceability Model Oriented to Software Safety Requirement Analysis Process 计算机科学, 2017, 44(4): 30-34. https://doi.org/10.11896/j.issn.1002-137X.2017.04.007 |
[9] | 马媛媛,陈喆,汪晨,费稼轩,黄秀丽. 电力智能单元传输规约安全性分析模型研究 Security Analysis Model of Power Intelligent Unit Transmission Protocols 计算机科学, 2016, 43(Z11): 329-337. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.077 |
[10] | 徐文华,张育平. 基于航电系统架构模型的安全性分析工具的设计与实现 Design and Implementation of Safety Analysis Tool Based on Avionics System Architecture Model 计算机科学, 2016, 43(Z11): 536-541. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.121 |
[11] | 徐丹慧,亢保元. 一个安全的基于身份的强指定验证者签名方案 Secure Identity-based Strong Designated Verifier Signature Scheme 计算机科学, 2016, 43(4): 50-52. https://doi.org/10.11896/j.issn.1002-137X.2016.04.010 |
[12] | 彭颖,姚淑珍,谭火彬. 基于随机时间Petri网的安全性分析方法 Safety Analysis Method Based on Stochastic Time Petri Nets 计算机科学, 2016, 43(11): 61-65. https://doi.org/10.11896/j.issn.1002-137X.2016.11.011 |
[13] | 钱琦锋 程春玲. WSN中基于非双线性对的无证书群组密钥协商协议 Pairing-free Certificateless Group Key Agreement Protocol for Wireless Sensor Network 计算机科学, 2015, 42(7): 186-190. https://doi.org/10.11896/j.issn.1002-137X.2015.07.041 |
[14] | 张亦辰,李继国,钱 娜. 无证书强指定验证者签名方案 Certificateless Strong Designated Verifier Signature Scheme 计算机科学, 2015, 42(3): 132-135. https://doi.org/10.11896/j.issn.1002-137X.2015.03.027 |
[15] | 谷青范,王国庆,张丽花,翟 鸣. 基于模型驱动的航电系统安全性分析技术研究 Research on Model Based Safety Analysis Technology for Avionics System 计算机科学, 2015, 42(3): 124-127. https://doi.org/10.11896/j.issn.1002-137X.2015.03.025 |
|