检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:赵洪 喻书涵 韩妍妍 李兆斌 ZHAO Hong;YU Shuhan;HAN Yanyan;LI Zhaobin(Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
机构地区:[1]北京电子科技学院电子与通信工程系,北京100070 [2]北京电子科技学院网络空间安全系,北京100070
出 处:《计算机应用》2023年第1期147-153,共7页journal of Computer Applications
基 金:北京高校高精尖学科建设项目(20210048Z0402)。
摘 要:针对汤永利等提出的9种无证书签名方案(汤永利,王菲菲,叶青,等.改进的可证明安全无证书签名方案.北京邮电大学学报,2016,39(1):112-116),首先使用线性化方程分析方法,发现所有方案中公钥之间存在线性关系,利用此缺陷完成对所有方案的签名伪造攻击;其次,为打破公钥之间的线性关系,使用改造哈希函数参数的方法改进方案,并在随机预言机模型下证明了改进方案的安全性;然后,提出一种无证书签名方案中的公钥构造格式,通过该格式构造出的签名方案无法被敌手进行公钥替换攻击;最后,通过仿真对改进方案与现有的无证书签名方案进行效率比较。实验结果表明,改进方案在提高安全性的同时未降低计算效率。For nine certificateless signature schemes proposed by Y L Tang, et al.(TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116), firstly, the linearized equation analysis method was used. It was found that there was a linear relationship between the public keys in all schemes. This defect was exploited to complete a signature forgery attack on all schemes. Secondly, in order to break the linear relationship between the public keys, the method of modifying the parameters of hash function was used to improve the scheme, and the security of the improved scheme was proved under the random oracle model. Thirdly, a public key construction format of certificateless signature scheme was proposed. The signature scheme constructed by this format could not be attacked by adversaries using public key replacement. Finally, the efficiency of the improved scheme was compared with those of the existing certificateless signature schemes through simulation. Experimental results show that the improved scheme promotes the security without reducing the computational efficiency.
关 键 词:无证书签名 线性化方程分析 伪造攻击 随机预言机模型 可证明安全
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49