无证书签名方案的分析与改进  被引量:1

Analysis and improvement of certificateless signature scheme

在线阅读下载全文

作  者:赵洪 喻书涵 韩妍妍 李兆斌 ZHAO Hong;YU Shuhan;HAN Yanyan;LI Zhaobin(Department of Electronics and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China;Department of Cyberspace Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China)

机构地区:[1]北京电子科技学院电子与通信工程系,北京100070 [2]北京电子科技学院网络空间安全系,北京100070

出  处:《计算机应用》2023年第1期147-153,共7页journal of Computer Applications

基  金:北京高校高精尖学科建设项目(20210048Z0402)。

摘  要:针对汤永利等提出的9种无证书签名方案(汤永利,王菲菲,叶青,等.改进的可证明安全无证书签名方案.北京邮电大学学报,2016,39(1):112-116),首先使用线性化方程分析方法,发现所有方案中公钥之间存在线性关系,利用此缺陷完成对所有方案的签名伪造攻击;其次,为打破公钥之间的线性关系,使用改造哈希函数参数的方法改进方案,并在随机预言机模型下证明了改进方案的安全性;然后,提出一种无证书签名方案中的公钥构造格式,通过该格式构造出的签名方案无法被敌手进行公钥替换攻击;最后,通过仿真对改进方案与现有的无证书签名方案进行效率比较。实验结果表明,改进方案在提高安全性的同时未降低计算效率。For nine certificateless signature schemes proposed by Y L Tang, et al.(TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116), firstly, the linearized equation analysis method was used. It was found that there was a linear relationship between the public keys in all schemes. This defect was exploited to complete a signature forgery attack on all schemes. Secondly, in order to break the linear relationship between the public keys, the method of modifying the parameters of hash function was used to improve the scheme, and the security of the improved scheme was proved under the random oracle model. Thirdly, a public key construction format of certificateless signature scheme was proposed. The signature scheme constructed by this format could not be attacked by adversaries using public key replacement. Finally, the efficiency of the improved scheme was compared with those of the existing certificateless signature schemes through simulation. Experimental results show that the improved scheme promotes the security without reducing the computational efficiency.

关 键 词:无证书签名 线性化方程分析 伪造攻击 随机预言机模型 可证明安全 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象