作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (16): 140-142. doi: 10.3969/j.issn.1000-3428.2009.16.050

• 安全技术 • 上一篇    下一篇

三类无证书签名方案的缺陷及改进

农 强1,郝艳华1,吴顺祥2   

  1. (1. 漳州师范学院计算机科学与工程系,漳州 363000;2. 厦门大学自动化系,厦门 361005)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-08-20 发布日期:2009-08-20

Flaw and Improvement of Three Certificateless Signature Schemes

NONG Qiang1, HAO Yan-hua1, WU Shun-xiang2   

  1. (1. Department of Computer Science and Engineering, Zhangzhou Normal University, Zhangzhou 363000; 2. Department of Automation, Xiamen University, Xiamen 361005)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-08-20 Published:2009-08-20

摘要: 对最近提出的2个在随机预言模型中可证安全的无证书签名方案和1个在标准模型中可证安全的无证书签名方案进行安全性分析,指出这3个方案不能抵抗替换公钥攻击的安全隐患,在这种攻击下攻击者能够生成新的公钥满足合法签名者生成的合法签名。给出改进措施,有效克服原方案中的设计缺陷。

关键词: 无证书签名, 替换公钥攻击, 双线性对

Abstract: The security flaws of two provably-secure certificateless signature schemes in the random oracle model and a provably-secure certificateless signature scheme in the standard model are analyzed. It is found that the three schemes are all insecure against public key replacement attack. In this attack, an adversary can generate a new public key satisfying legitimate signatures created by the legitimate signer. In order to avoid these flaws, an improvement measure is proposed, which can resolve the security problems existing in the original schemes.

Key words: certificateless signature, public key replacement attack, bilinear pairings

中图分类号: