首页 | 本学科首页   官方微博 | 高级检索  
     

三类无证书签名方案的缺陷及改进
引用本文:农强,郝艳华,吴顺祥.三类无证书签名方案的缺陷及改进[J].计算机工程,2009,35(16):140-142.
作者姓名:农强  郝艳华  吴顺祥
作者单位:1. 漳州师范学院计算机科学与工程系,漳州,363000
2. 厦门大学自动化系,厦门,361005
基金项目:国家自然科学基金资助项目,国家"十一五"科技支撑计划基金资助项目,福建省教育厅科技基金资助项目,福建省青年科技人才创新基金资助项目 
摘    要:对最近提出的2个在随机预言模型中可证安全的无证书签名方案和1个在标准模型中可证安全的无证书签名方案进行安全性分析,指出这3个方案不能抵抗替换公钥攻击的安全隐患,在这种攻击下攻击者能够生成新的公钥满足合法签名者生成的合法签名。给出改进措施,有效克服原方案中的设计缺陷。

关 键 词:无证书签名  替换公钥攻击  双线性对
修稿时间: 

Flaw and Improvement of Three Certificateless Signature Schemes
NONG Qiang,HAO Yan-hua,WU Shun-xiang.Flaw and Improvement of Three Certificateless Signature Schemes[J].Computer Engineering,2009,35(16):140-142.
Authors:NONG Qiang  HAO Yan-hua  WU Shun-xiang
Affiliation:1.Department of Computer Science and Engineering;Zhangzhou Normal University;Zhangzhou 363000;2.Department of Automation;Xiamen University;Xiamen 361005
Abstract:The security flaws of two provably-secure certificateless signature schemes in the random oracle model and a provably-secure certificateless signature scheme in the standard model are analyzed.It is found that the three schemes are all insecure against public key replacement attack.In this attack,an adversary can generate a new public key satisfying legitimate signatures created by the legitimate signer.In order to avoid these flaws,an improvement measure is proposed,which can resolve the security problems ...
Keywords:certificateless signature  public key replacement attack  bilinear pairings  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号