计算机科学 ›› 2021, Vol. 48 ›› Issue (10): 272-277.doi: 10.11896/jsjkx.201200117

所属专题: 密码学 虚拟专题

• 信息安全 • 上一篇    下一篇

一个强安全的无证书签名方案的分析和改进

叶胜男, 陈建华   

  1. 武汉大学数学与统计学院 武汉430000
  • 收稿日期:2020-12-14 修回日期:2021-05-03 出版日期:2021-10-15 发布日期:2021-10-18
  • 通讯作者: 陈建华(chenjh_ecc@163.com)
  • 作者简介:ellaye@whu.edu.cn

Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme

YE Sheng-nan, CHEN Jian-hua   

  1. School of Mathematics and Statistics,Wuhan University,Wuhan 430000,China
  • Received:2020-12-14 Revised:2021-05-03 Online:2021-10-15 Published:2021-10-18
  • About author:YE Sheng-nan,born in 1996,postgra-duate.Her main research interests include cryptography and information security.
    CHEN Jian-hua,born in 1964,Ph.D,professor,Ph.D supervisor.His main research interests include cryptography and information security.

摘要: 无证书公钥密码体制结合了基于身份的密码体制和传统PKI公钥密码体制的优势,克服了基于身份的公钥密码体制的密钥托管问题及PKI系统的证书管理问题,具有明显的优势。对Hassouna等提出的一个强安全无证书签名方案进行安全分析。结果表明,该方案不能验证消息的完整性,存在消息篡改攻击,且方案未使用根据系统主密钥生成的私钥进行签名,所以不是无证书签名方案。在此基础上,提出了一个改进的无证书签名方案,在随机预言机模型下,基于椭圆曲线Diffie-Hellman问题假设,证明了该方案可以抵抗第一类强敌手和第二类敌手的攻击,满足存在性不可伪造的安全性。

关键词: 安全性分析, 双线性对, 随机预言机模型, 椭圆曲线Diffie-Hellman问题, 无证书签名

Abstract: Certificateless public key cryptosystem combines the advantages of identity-based cryptosystem and traditional PKI public key cryptosystem,overcomes the key escrow problem of identity-based public key cryptosystem and the certificate management problem of PKI system,and has obvious advantages.By analysing the security of a strongly secure certificateless signature scheme proposed by Hassouna,et al,it shows that the scheme cannot resist the attack of falsifying messages and do not use private key generated by system master key to sign.So it is not a certificateless signature scheme.On this basis,an improved certificateless signature scheme is proposed and it proves the scheme can resist the attack of the first class of strong adversaries and the second class of adversaries.In the random oracle model and under the assumption of the Diffie-Hellman problem of the elliptic curve,the improved scheme satisfies the existential forgery.

Key words: Bilinear pairings, Certificateless signature, Elliptic curve discrete Diffie-Hellman problem, Random oracle model, Security analysis

中图分类号: 

  • TN918
[1]SHAMIR A.Identity-Based Cryptosystems and SignatureSchemes[C]//Workshop on the Theory & Application of Cryptographic Techniques.Berlin:Springer,1984.
[2]BARRETO P S L M,KIM H Y,LYNN B,et al.Efficient Algorithms for Pairing-Based Cryptosystems[C]//International Cryptology Conference on Advances in Cryptology.Berlin:Springer,2002.
[3]BARRETO P,LYNN B,SCOTT M.Constructing EllipticCurves with Prescribed Embedding Degrees[C]//Springer Berlin Heidelberg.Berlin:Springer, 2003.
[4]BONEH D,LYNN B,SHACHAM H.Short Signatures from the Weil Pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2001.
[5]HESS F.Efficient Identity Based Signature Schemes Based on Pairings[C]//International Workshop on Selected Areas in Cryptography.Berlin:Springer, 2003.
[6]RIYAMI S S,PATERSON K G.Certificateless Public KeyCryptography[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer,2003.
[7]DENT A W,BENOÎT L,PATERSON K G.Certificateless encryption schemes strongly secure in the standard model[C]//Public Key Cryptography-PKC 2008,11th International Workshop on Practice and Theory in Public-Key Cryptography,Barcelona,Spain,2008.Berlin:Springer,2008.
[8]VIVEK S S,SELVI S S D,RANGAN C P.CCA2 Secure Certificateless Encryption Schemes Based on RSA[C]//International Conference on Security & Cryptography.IEEE,2014.
[9]WANG C,HUANG H,TANG Y.An Efficient CertificatelessSignature from Pairings[C]//International Symposium on Data.IEEE,2007.
[10]XIONG H,QIN Z,LI F.An Improved Certificateless Signature Scheme Secure in the Standard Model[J].Fundamenta Informa-ticae,2008,88(1):193-206.
[11]ZHANG L,ZHANG F.A New Provably Secure Certificateless Signature Scheme[C]//IEEE International Conference on Communications.IEEE,2008.
[12]SHIM K A.Forgery Attacks on Two Provably Secure Certificateless Signature Schemes[J].Information Sciences,2020,521:81-87.
[13]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692.
[14]HUANG L,ZHOU J,ZHANG G,et al.Certificateless PublicVerification for the Outsourced Data Integrity in Cloud Storage[J].Journal of Circuits,Systems and Computers,2018,27(11):1850181.1-1850181.17.
[15]YANG X D,WANG M D,PEI X Z,et al.Security Analysis and Improvement of a Certificateless Signature Scheme in theStan-dard Model[J].Acta Electronica Sinica,2019,47(9):1972-1978.
[16]DU H Z,WEN Q Y,ZHANG S S,et al.A new provably secure certificateless signature scheme for Internet of Things[J].Ad Hoc Networks,2019,100:102074.
[17]YANG X,PEI X,CHEN G,et al.A Strongly Unforgeable Certificateless Signature Scheme and Its Application in IoT Environments[J].Sensors,2019,19(12):2692.
[18]SELVI S S D,VIVEK S S,RANGAN C P.Certificateless KEM and Hybrid Signcryption Schemes Revisited[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2010.
[19]XIE W,ZHANG Z.Certificateless signcryption without pairing[J/OL].IACR Cryptology ePrint Archive,2010,187.https://www.researchgate.net/publication/220336349_Certificateless_Signcryption_without_Pairing.
[20]XIE W,ZHANG Z.Efficient and provably secure certificateless signcryption from bilinear maps[C]//IEEE International Conference on Wireless Communications.IEEE,2010.
[21]HASSOUNA M,BASHIER E,BARRY B.A Short Certificateless Digital Signature Scheme[C]//International Conference of Digital Information Processing,Data Mining and Wireless Communications.2015.
[22]HASSOUNA M,BASHIER E,BARRY B.A Strongly SecureCertificateless Digital Signature Scheme in The Random Oracle Model[J].International Journal of Network Security,2016,18(5):938-945.
[23]HUANG X,MU Y,SUSILO W,et al.Certificateless Signature Revisited[C]//Australasian Conference on Information Security &Privacy.Springer-Verlag,2007.
[24]ZHANG Z,WONG D S,XU J,et al.Certificateless Public-Key Signature:Security Model and Efficient Construction[C]//International Conference on Applied Cryptography & Network Security.Springer-Verlag,2006.
[25]CHEN J S,HUANG Z J.Efficient certificbased signature schenle[J].Computer Engineering Applications,2012,48(30):98-102.
[26]LIU J K, BAEK J, SUSILO W,et al.Certificate-Based Signature Schemes without Pairings or Random Oracles[C]//Information Security,International Conference,Isc,Taipei,Taiwan,September.Berlin:Springer,2008.
[27]MING Y,WANG Y M.Efficient Certificateless SignatureScheme Based on Bilinear Pairings[J].Journal of University of Electronic Science and Technology of China,2008,37(2):175-177.
[1] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[2] 刘帅, 陈建华.
无双线性对的无证书签名方案及其在配电网中的应用
Certificateless Signature Scheme Without Bilinear Pairings and Its Application in Distribution Network
计算机科学, 2020, 47(9): 304-310. https://doi.org/10.11896/jsjkx.200500002
[3] 张浩, 蔡英, 夏红科.
VANET中基于RSU辅助签名环形成的方案
RSU-based Assisting Ring Formation Scheme in VANET
计算机科学, 2020, 47(5): 301-305. https://doi.org/10.11896/jsjkx.190400119
[4] 左黎明, 陈祚松, 夏萍萍, 汤鹏志, 康文洋.
一种改进的高效无证书短签名方案
Improved Efficient Certificateless Short Signature Scheme
计算机科学, 2019, 46(4): 172-176. https://doi.org/10.11896/j.issn.1002-137X.2019.04.027
[5] 韦性佳,张京花,刘增芳,芦殿军.
具有前向安全性质的基于身份的聚合签名方案
Identity Based Aggregate Signature Scheme with Forward Security
计算机科学, 2018, 45(6A): 387-391.
[6] 丁庆洋,王秀利,朱建明,宋彪.
基于区块链的信息物理融合系统的信息安全保护框架
Information Security Framework Based on Blockchain for Cyber-physics System
计算机科学, 2018, 45(2): 32-39. https://doi.org/10.11896/j.issn.1002-137X.2018.02.006
[7] 胡小明,马闯,斯桃枝,蒋文蓉,许华杰,谭文安.
改进的无证书广义指定验证者聚合签名方案
Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier
计算机科学, 2017, 44(8): 168-175. https://doi.org/10.11896/j.issn.1002-137X.2017.08.030
[8] 郑培真,苑春春,刘超,吴际,杨海燕,胡宁.
面向软件安全性需求分析过程的追踪模型
Traceability Model Oriented to Software Safety Requirement Analysis Process
计算机科学, 2017, 44(4): 30-34. https://doi.org/10.11896/j.issn.1002-137X.2017.04.007
[9] 马媛媛,陈喆,汪晨,费稼轩,黄秀丽.
电力智能单元传输规约安全性分析模型研究
Security Analysis Model of Power Intelligent Unit Transmission Protocols
计算机科学, 2016, 43(Z11): 329-337. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.077
[10] 徐文华,张育平.
基于航电系统架构模型的安全性分析工具的设计与实现
Design and Implementation of Safety Analysis Tool Based on Avionics System Architecture Model
计算机科学, 2016, 43(Z11): 536-541. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.121
[11] 徐丹慧,亢保元.
一个安全的基于身份的强指定验证者签名方案
Secure Identity-based Strong Designated Verifier Signature Scheme
计算机科学, 2016, 43(4): 50-52. https://doi.org/10.11896/j.issn.1002-137X.2016.04.010
[12] 彭颖,姚淑珍,谭火彬.
基于随机时间Petri网的安全性分析方法
Safety Analysis Method Based on Stochastic Time Petri Nets
计算机科学, 2016, 43(11): 61-65. https://doi.org/10.11896/j.issn.1002-137X.2016.11.011
[13] 钱琦锋 程春玲.
WSN中基于非双线性对的无证书群组密钥协商协议
Pairing-free Certificateless Group Key Agreement Protocol for Wireless Sensor Network
计算机科学, 2015, 42(7): 186-190. https://doi.org/10.11896/j.issn.1002-137X.2015.07.041
[14] 张亦辰,李继国,钱 娜.
无证书强指定验证者签名方案
Certificateless Strong Designated Verifier Signature Scheme
计算机科学, 2015, 42(3): 132-135. https://doi.org/10.11896/j.issn.1002-137X.2015.03.027
[15] 谷青范,王国庆,张丽花,翟 鸣.
基于模型驱动的航电系统安全性分析技术研究
Research on Model Based Safety Analysis Technology for Avionics System
计算机科学, 2015, 42(3): 124-127. https://doi.org/10.11896/j.issn.1002-137X.2015.03.025
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!