计算机工程

• 安全技术 • 上一篇    下一篇

高效可证明安全的无证书签名方案

汤永利1,王菲菲1,闫玺玺1,李子臣2   

  1. (1.河南理工大学计算机科学与技术学院,河南 焦作 454000; 2.北京印刷学院信息工程学院,北京 101399)
  • 收稿日期:2015-08-13 出版日期:2016-03-15 发布日期:2016-03-15
  • 作者简介:汤永利(1972-),男,副教授、博士,主研方向为信息安全、密码学;王菲菲,硕士研究生;闫玺玺,讲师、博士;李子臣,教授、博士生导师。
  • 基金项目:

    国家自然科学基金资助项目(61370188,61300216);河南省重点科技攻关计划基金资助项目(122102310309);河南省基础与前沿技术研究基金资助项目(142300410147);河南理工大学博士基金资助项目(B2011-058)。

Efficient and Provably Secure Certificateless Signature Schemes

TANG Yongli 1,WANG Feifei 1,YAN Xix i 1,LI Zichen  2   

  1. (1.College of Computer Science and Technology,Henan Polytechnic University,Jiaozuo,Henan 454000,China; 2.College of Information Engineering,Beijing Institute of Graphic Communication,Beijing 101399,China)
  • Received:2015-08-13 Online:2016-03-15 Published:2016-03-15

摘要:

无证书公钥密码体制解决了基于身份的密码体制的密钥托管问题,且无需使用公钥证书。为此,借鉴无证书密码体制的思想,基于椭圆曲线离散对数问题,提出一类无双线性对的无证书签名方案,包括8种子签名方案,并在随机预言机模型下对其进行安全性证明。结果表明,提出方案可抵抗2类超级攻击以及存在性伪造攻击,具有较高的安全性。其中的最优方案在签名阶段与验证阶段仅需1次和2次标量乘法运算,计算效率相比现有无证书签名方案有明显提高。

关键词: 无证书公钥密码体制, 数字签名, 椭圆曲线离散对数问题, 存在性伪造攻击, 可证明安全

Abstract:

Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the thought of certificateless public key cryptography,a class of provably secure certificateless signature schemes based on Elliptic Curve Discrete Logarithm Problem(ECDLP) without pairing is proposed,which includes eight kind of signature schemes.The proposed schemes are proved provably secure in random oracle model.The analysis result shows that the proposed schemes can resist two types of super adversary and existential forgery attack,accordingly the proposed schemes have a higher security.The signing algorithm of the optimal scheme only needs one scalar multiplication,and the validation algorithm of the optimal scheme only needs two scalar multiplication.The optimal scheme is more computationally efficient than the existing schemes.

Key words: certificateless public key cryptography, digital signature, Elliptic Curve Discrete Logarithm Problem(ECDLP), existential forgery attack, provably secure

中图分类号: