山东大学学报(理学版) ›› 2015, Vol. 50 ›› Issue (11): 52-59.doi: 10.6040/j.issn.1671-9352.0.2014.442
农强, 黄振杰, 黄茹芬
NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen
摘要: 针对已有的基于计算Diffle-Hellman问题提出的无证书聚合签名方案构造了三种伪造攻击算法,攻击显示恶意但被动或者诚实但好奇的密钥生成中心均可伪造任意用户对任意消息的有效聚合签名,同时该方案也无法抵抗不诚实用户的合谋攻击。分析了原方案不安全的原因,通过在部分私钥生成阶段将用户公钥作为输入的参数,并在签名阶段将部分私钥与秘密值分别与不同的散列函数进行绑定,给出了高效的无需安全信道和双线性对的改进方案。改进方案的安全性可规约到更一般的离散对数困难问题。
中图分类号:
[1] AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]//Advances in Cryptology-Asiacrypt 2003.Berlin:Springer, 2003:452-473. [2] BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Cryptology-Eurocrypt 2003. Berlin:Springer, 2003:416-432. [3] GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C]//Proceedings of IEEE SNPD 2007. Washington:IEEE Computer Society, 2007:188-193. [4] ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14):2482-2491. [5] XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013, 219:225-235. [6] ZHANG Futai, SHEN Limin, WU Ge. Notes on the security of certificateless aggregate signature schemes[EB/OL].[2014-04-24]. http://dx.doi.org/10.1016/j.ins.2014.07.019. [7] 侯红霞, 张雪锋, 董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报:理学版, 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University:Natural Science, 2013, 48(9):29-34. [8] CAO Xuefei, KOU Weidong, DU Xiaoni. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15):2895-2903. [9] RAFAEL C, RICARDO D.Two notes on the security of certificateless signatures[C]//Proceedings of ProvSec 2007. Berlin:Springer, 2007:85-102. [10] KOBLITZ N, MENEZES A, VANSTONE S. The state of elliptic curve cryptography[J]. Designs, Codes and Cryptography, 2000, 19(2-3):173-193. [11] ZHANG Yanchao, LIU Wei, LOU Wenjing, et al. Securing mobile Ad Hoc networks with certificateless public keys[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4):386-399. |
[1] | 胡江红,杜红珍,张建中. 两类无证书聚合签名方案的分析与改进[J]. 山东大学学报(理学版), 2016, 51(7): 107-114. |
[2] | 朱斌瑞,秦静,韩斐. 基于生物特征的可搜索加密[J]. 山东大学学报(理学版), 2016, 51(5): 78-86. |
[3] | 樊爱宛, 夏栋梁, 杨照峰. 两种无证书聚合签名方案的安全性分析及改进[J]. 山东大学学报(理学版), 2015, 50(09): 42-48. |
[4] | 侯红霞1,2,张雪锋2,董晓丽2. 改进的无证书聚合签名方案[J]. J4, 2013, 48(09): 29-34. |
[5] | 张方国. 椭圆曲线在密码中的应用:过去,现在,将来…[J]. J4, 2013, 48(05): 1-13. |
[6] | 吴磊1 ,孔凡玉2 . 一种高效的基于身份代理环签名方案[J]. J4, 2009, 44(1): 40-43 . |
[7] | 刘晓东,蒋亚丽,李大兴 . 两种基于生物特征信息的身份签名方案[J]. J4, 2007, 42(12): 24-28 . |
[8] | 李国文,李如鹏,王 进,李大兴 . Wang门限签名方案的分析和改进[J]. J4, 2007, 42(1): 55-58 . |
|