首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 62 毫秒
1.
与传统的公钥密码体制和基于身份的密码体制不同,无证书公钥密码体制不需要证书来证明公钥的真实性,同时也避免了基于身份的公钥密码体制中存在的密钥托管问题。现有的无证书签名方案大多是使用双线性对来构造的,因而计算代价比较大。为了解决上述问题,提出了一个不含双线性对的无证书签名方案。基于离散对数困难问题假定,在随机预言模型下证明所提出的方案是安全的。  相似文献   

2.
具有强安全性的不含双线性对的无证书签名方案   总被引:6,自引:0,他引:6  
该文提出了一种满足强安全性的不需双线性对运算的无证书签名方案,能抵抗适应性选择消息和适应性选择身份的存在性伪造攻击,并且在随机预言模型下基于离散对数难题给出了完整的安全性证明。与现有的绝大多数无证书签名方案都是基于双线性对的不同,该文提出的新方案没有复杂的双线性对运算,具有明显的效率优势。另外,通过对王会歌等人的无证书签名方案进行分析,指出此方案是不安全的,并给出了具体的攻击方法。  相似文献   

3.
高效的无证书短签名方案   总被引:2,自引:0,他引:2  
无证书密码体制不仅有效地解决了基于身份密码系统中固有的密钥托管问题而且成功地避免了公钥证书的使用,近年来得到了广泛的应用。基于无证书密码系统,提出了一个新的无证书短签名方案,新方案构造简洁、高效,在签名验证阶段仅需2次对运算。方案在随机预言机模型下是可证明安全的,更适于在公开且低带宽的通信环境下应用。  相似文献   

4.
许艳  黄刘生  田苗苗  仲红  崔杰 《电子学报》2016,44(8):1845-1850
聚合签名能够实现批验证,特别适用于资源受限的无线网络中批量身份认证.无证书密码体制能够解决聚合签名的证书管理或私钥托管问题.本文首先对一个无证书聚合签名方案进行分析,随后提出更加安全高效的无证书聚合签名方案,方案验证时需要更少的双线性对操作.最后在随机预言模型下证明方案具有不可伪造性,其安全性等价于求解CDH(Computation Diffie-Hellman)困难问题.  相似文献   

5.
对王亚飞等人提出的强安全性无证书签名方案进行安全性分析,指出其方案难以抵抗不诚实KGC下的公钥替换攻击。针对此类问题,采用改变传统无证书算法顺序,以KGC公告板形式公开用户公钥,用户可以通过本地保存的私钥和公钥验证公钥的真实性,从而对KGC的行为进行约束。安全性分析表明,改进后的方案能够抵抗基于不诚实 KGC安全级别下的公钥替换攻击,而且方案避开了无双线性对和逆运算,效率优于已有方案。  相似文献   

6.
高效的无证书有序多重签名方案   总被引:2,自引:0,他引:2  
秦艳琳  吴晓平 《通信学报》2013,34(7):12-110
针对分布式环境下信任建模中信任链上推荐信息的认证问题,研究了无证书有序多重签名方案的安全模型,进而基于椭圆曲线密码和双线性映射提出一个无证书有序多重签名方案,并在随机预言机模型下,证明方案的安全性建立在计算 Diffie-Hellman 问题的困难性上。该方案无需证书管理中心,多重签名的长度与单用户的签名长度相当,与签名人数无关,在部分签名阶段不需双线性对运算,在部分签名及整体签名的验证阶段都只需一个双线性对运算,与同类方案相比,具有运行效率上的优势,可方便地应用于大规模分布式环境下信任传播的过程中。  相似文献   

7.
提出了一个高效的无证书盲签名方案。在随机预言机模型下,证明了新方案在适应性选择消息、选择身份攻击下是存在不可伪造的,能够有效抵抗AI攻击者的替换公钥攻击和AⅡ攻击者的KGC攻击。方案中在签名阶段没有任何双线性对运算,在验证阶段只有一个双线性对运算,并且不需要使用映射到点(Mapto Point)的特殊哈希函数。与已有方案相比,所提方案在计算量上更具优势。同时方案采用无证书公钥密码体制,解决了基于证书签名方案的证书管理问题和基于身份签名方案的密钥托管问题。  相似文献   

8.
针对目前的方案多采用后一个签名者对前一个签名者的签名进行验证后,再将签名传递给下一个签名者,导致整体签名时间过长的效率问题,基于双线性对构造了一种无证书有序聚合签名方案。多个用户按照一定的顺序对文件进行签名和认证生成聚合签名,验证者只需验证最终一个签名就可以确认签名顺序的正确性以及多个用户签名的合法性。所提方案有效降低了验证多用户顺序签名的复杂性,实现了当用户处于离线状态或者处于节点缓存能力与网络资源受限的容迟网络时,对签名合法性的离线验证。在随机预言机模型下,仿真实验证明了所提方案在敌手适应性选择消息下是存在性不可伪造的。  相似文献   

9.
针对无证书签名方案普遍存在执行效率低下的问题,在无证书公钥密码体制下给出一种新的高效率签名方案,并在随机预言机模型下基于离散对数困难问题证明了其安全性。新方案避免使用双线性对运算、指数运算并且使用一般的hash运算替代映射到点的hash运算,提高了运算效率;新方案的签名长度仅为2个整数点长度,通信效率较高。性能分析表明,新方案在保证安全性的前提下具有较高的执行效率,适用于带宽和能源受限的Ad hoc网络等。  相似文献   

10.
进一步完善ELGamal盲签名体制,研究了基于ELGamal签名方程的盲签名方案。概述了盲签名的定义及其分类标准,基于不同的签名方程,和有限域上离散对数难解性假设,得到了相应的强盲签名和弱盲签名方案。首次系统地对不同的ELGamal签名方程进行了盲性研究,并对每个盲签名方案进行了盲性分析和安全性分析。  相似文献   

11.
无证书的公钥密码学解决了基于PKI的公钥密码学的证书管理问题,以及基于身份的公钥密码学的密钥托管问题。最近,王等提出了一个不含双线性对运算的无证书签名方案。然而,通过对其进行分析,发现此方案是完全不安全的(即敌手可以获取用户的私钥),并给出了具体的攻击方法。为了改进其安全性,提出了一个新的更安全的无对的无证书签名方案,并在随机预言机模型下基于离散对数困难问题给出了安全性证明。此外,新方案效率非常高,签名算法只需要1个点乘运算,验证算法需要3个点乘运算。  相似文献   

12.
Proxy signature is an active research area in cryptography. A proxy signature scheme allows an entity to delegate his or her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Many proxy signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is more than 10 times of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, we propose a proxy signature scheme without bilinear pairings and prove its security against adaptive chosen‐message attack in random oracle model. The security of our scheme is based on the hardness of the elliptic curve discrete logarithm problem. With the running time being saved greatly, our scheme is more practical than the previous related scheme for practical applications. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

13.
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identitybased cryptography. The certificateless signature scheme is studied widely as an important primitive. Following the pioneering work done by Al‐Riyami et al., many certificateless signature schemes using bilinear pairings have been proposed ever since. However, the relative computation cost of the pairing is approximately 20 times higher than that of the scalar multiplication over the elliptic curve group. To improve the performance we propose a certificateless signature scheme without bilinear pairings. With the running time being reduced greatly, our scheme is more practical than the previous related schemes for practical application. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

14.
Secure mediated certificateless signature scheme   总被引:1,自引:0,他引:1  
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.  相似文献   

15.
Recently, He et al. proposed an efficient certificateless signature (CLS) scheme without pairings and demonstrated their scheme to be provably secure in the random oracle model. Unfortunately, Tian and Huang and Tsai et al. pointed out that the scheme cannot withstand a Type II adversary's attack. Tsai et al. also proposed an improved scheme to enhance security. However, the schemes of He et al. and Tsai et al. are not real CLS schemes because the user's public key is used to generate its partial private key. Besides, He et al. and Tsai et al. just demonstrated that their schemes are secure against the normal adversary in the random oracle model. In this paper, we propose a real CLS scheme and demonstrate that our scheme is secure against the super adversary. Security analysis and performance analysis show that our scheme could enhance security and increase computational cost slightly. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

16.
Certificateless universal designated verifier signature schemes   总被引:2,自引:0,他引:2  
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact.The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required.This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed.The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system.Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.  相似文献   

17.
Tonien等在ISC2006上首次提出了多方并发签名体制,但Xie和谭指出Tonien等的方案并不满足公平性,进而分别重新构造了多方并发签名方案。分别对Xie和谭的多方并发签名方案进行了分析,指出他们的方案也不满足公平性,进而正式定义了公平多方并发签名的安全模型,并基于双线性对及多方密钥协商技术重新构造了一个多方并发签名方案。分析表明,在随机预言模型下,假设CDH问题是难解的,新方案同时满足正确性、不可伪造性、模糊性、并发性和公平性,并且与同类方案相比,新方案在签名长度、计算量、通信代价方面效率较高。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号