作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (7): 136-138,. doi: 10.3969/j.issn.1000-3428.2009.07.046

• 安全技术 • 上一篇    下一篇

一种无证书代理签名的改进方案

梁中银1,杨晓元1,2,周宣武1,2,史国炜1   

  1. (1. 武警工程学院电子技术系网络与信息安全武警部队重点实验室,西安 710086;
    2. 西安电子科技大学网络信息安全教育部重点实验室,西安 710071)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-04-05 发布日期:2009-04-05

Improved Scheme for Certificateless Proxy Signature

LIANG Zhong-yin1, YANG Xiao-yuan1,2, ZHOU Xuan-wu1,2, SHI Guo-wei1   

  1. (1. Key Laboratory of Network & Information Security of APF, Department of Electronic Technique, Engineering College of APF, Xi’an 710086;
    2. Key Laboratory of Network & Information Security of the Ministry of Education, Xidian University Xi’an 710071)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-04-05 Published:2009-04-05

摘要: 证明Lu Rongbo等人的代理签名方案(Proc. of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2007)不能抵抗替换公钥攻击和恶意但被动的密钥生成中心(KGC)攻击,普通攻击者可通过替换公钥伪造出有效的代理签名,KGC通过恶意但被动的KGC攻击可获得用户的私钥,从而能任意伪造出有效的代理签名。针对替换公钥攻击和KGC攻击,提出一个改进方案,新方案满足代理签名的安全性要求,能有效抵抗替换公钥攻击和恶意但被动的KGC攻击。

关键词: 无证书公钥密码体制, 代理签名, 双线性对

Abstract: This paper shows that Lu’s proxy signature is insecure against a key replacement attack and malicious-but-passive(KGC) attack. The attack shows that anyone who replaces both the original signer and the proxy signer’s public key can forge valid signatures which seems to be generated by the proxy signer on behalf of this adversary himself, and KGC who can’t replace the public key can get the signers’ private keys and forge valid signatures. To thwart these attacks, this paper improves the scheme. The improved scheme is secure against the key replcement attack and the malicious-but-passive KGC attack.

Key words: ceritficateless public key cryptography, proxy signature, bilinear pairing

中图分类号: