全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

对一种无证书聚合签名方案的改进
Improvement of a certificateless aggregate signature scheme

DOI: 10.6040/j.issn.1671-9352.0.2014.442

Keywords: 无证书聚合签名,伪造攻击,双线性对,离散对数问题,安全信道,
certificateless aggregate signature
,secure channel,discrete logarithm problem,bilinear pairing,forgery attack

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要: 针对已有的基于计算Diffle-Hellman问题提出的无证书聚合签名方案构造了三种伪造攻击算法,攻击显示恶意但被动或者诚实但好奇的密钥生成中心均可伪造任意用户对任意消息的有效聚合签名,同时该方案也无法抵抗不诚实用户的合谋攻击。分析了原方案不安全的原因,通过在部分私钥生成阶段将用户公钥作为输入的参数,并在签名阶段将部分私钥与秘密值分别与不同的散列函数进行绑定,给出了高效的无需安全信道和双线性对的改进方案。改进方案的安全性可规约到更一般的离散对数困难问题。
Abstract: Three forgery attack algorithms on the existing certificateless aggregate signature scheme using the intractability of computational Diffie-Hellman problem were presented. It was found that the "malicious-but-passive" or the "honest-but-curious" key generation center could forge a valid aggregate signature on any message on behalf of any user. The scheme also can not resist collusion attack by dishonest users. The reasons of insecurity of the original scheme were analyzed. By means of adding the user's public key as an input parameter in the stage of partial private key generation, and binding the partial private key and secret value to different Hash functions respectively in the stage of signature generation, an improved scheme without secure channel and bilinear pairing was proposed. The security of the improved scheme can be reduced to the more general discrete logarithm problem

References

[1]  CAO Xuefei, KOU Weidong, DU Xiaoni. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15):2895-2903.
[2]  RAFAEL C, RICARDO D.Two notes on the security of certificateless signatures[C]//Proceedings of ProvSec 2007. Berlin:Springer, 2007:85-102.
[3]  ZHANG Futai, SHEN Limin, WU Ge. Notes on the security of certificateless aggregate signature schemes[EB/OL].[2014-04-24]. http://dx.doi.org/10.1016/j.ins.2014.07.019.
[4]  XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computations[J]. Information Science, 2013, 219:225-235.
[5]  侯红霞, 张雪锋, 董晓丽. 改进的无证书聚合签名方案[J]. 山东大学学报:理学版, 2013, 48(9):29-34. HOU Hongxia, ZHANG Xuefeng, DONG Xiaoli. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University:Natural Science, 2013, 48(9):29-34.
[6]  ZHANG Yanchao, LIU Wei, LOU Wenjing, et al. Securing mobile Ad Hoc networks with certificateless public keys[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4):386-399.
[7]  AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[C]//Advances in Cryptology-Asiacrypt 2003.Berlin:Springer, 2003:452-473.
[8]  BONEH D, GENTRY C, LYNN B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of Cryptology-Eurocrypt 2003. Berlin:Springer, 2003:416-432.
[9]  GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps[C]//Proceedings of IEEE SNPD 2007. Washington:IEEE Computer Society, 2007:188-193.
[10]  ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010, 54(14):2482-2491.
[11]  KOBLITZ N, MENEZES A, VANSTONE S. The state of elliptic curve cryptography[J]. Designs, Codes and Cryptography, 2000, 19(2-3):173-193.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133