共查询到15条相似文献,搜索用时 62 毫秒
1.
无证书的聚合签名的提出是为了解决密钥托管问题以及复杂的证书管理问题.然而在无证书的聚合签名中,一旦某一签名者的密钥发生泄漏,所有由此签名者参与生成的聚合签名都将不再安全.为了减小无证书的聚合签名中密钥泄漏带来的危害,本文首次将密钥隔离安全机制嵌入到无证书的聚合签名中,提出了密钥隔离的无证书聚合签名的概念和安全模型,并给出了一个实用的方案,通过与协助器的交互,实现了对签名者密钥的定时更新.同时证明了方案在随机预言机模型下是安全的,即,满足密钥隔离安全、强密钥隔离安全和安全密钥更新的性质. 相似文献
2.
高效的无证书短签名方案 总被引:2,自引:0,他引:2
无证书密码体制不仅有效地解决了基于身份密码系统中固有的密钥托管问题而且成功地避免了公钥证书的使用,近年来得到了广泛的应用。基于无证书密码系统,提出了一个新的无证书短签名方案,新方案构造简洁、高效,在签名验证阶段仅需2次对运算。方案在随机预言机模型下是可证明安全的,更适于在公开且低带宽的通信环境下应用。 相似文献
3.
无证书的公钥密码学解决了基于PKI的公钥密码学的证书管理问题,以及基于身份的公钥密码学的密钥托管问题。最近,王等提出了一个不含双线性对运算的无证书签名方案。然而,通过对其进行分析,发现此方案是完全不安全的(即敌手可以获取用户的私钥),并给出了具体的攻击方法。为了改进其安全性,提出了一个新的更安全的无对的无证书签名方案,并在随机预言机模型下基于离散对数困难问题给出了安全性证明。此外,新方案效率非常高,签名算法只需要1个点乘运算,验证算法需要3个点乘运算。 相似文献
4.
5.
6.
高效的无证书有序多重签名方案 总被引:2,自引:0,他引:2
针对分布式环境下信任建模中信任链上推荐信息的认证问题,研究了无证书有序多重签名方案的安全模型,进而基于椭圆曲线密码和双线性映射提出一个无证书有序多重签名方案,并在随机预言机模型下,证明方案的安全性建立在计算 Diffie-Hellman 问题的困难性上。该方案无需证书管理中心,多重签名的长度与单用户的签名长度相当,与签名人数无关,在部分签名阶段不需双线性对运算,在部分签名及整体签名的验证阶段都只需一个双线性对运算,与同类方案相比,具有运行效率上的优势,可方便地应用于大规模分布式环境下信任传播的过程中。 相似文献
7.
与传统的公钥密码体制和基于身份的密码体制不同,无证书公钥密码体制不需要证书来证明公钥的真实性,同时也避免了基于身份的公钥密码体制中存在的密钥托管问题。现有的无证书签名方案大多是使用双线性对来构造的,因而计算代价比较大。为了解决上述问题,提出了一个不含双线性对的无证书签名方案。基于离散对数困难问题假定,在随机预言模型下证明所提出的方案是安全的。 相似文献
8.
高效的可追踪的基于ID的签名方案 总被引:1,自引:0,他引:1
密钥托管问题是基于ID的数字签名的主要缺陷,为了解决该问题,提出了可追踪的基于ID的签名(T-IBS,traceable ID-based signature)的定义及安全模型,并构造了一个不需要双线性对的T-IBS方案,在随机预言机模型与椭圆曲线离散对数假设下该方案是可证安全的.与已有的无密钥托管的签名方案相比,该方案的签名算法只需要一个加法群上的标量乘运算,而验证算法仅需3个标量乘运算,所以是目前效率最高的方案. 相似文献
9.
10.
提出了一个高效的无证书盲签名方案。在随机预言机模型下,证明了新方案在适应性选择消息、选择身份攻击下是存在不可伪造的,能够有效抵抗AI攻击者的替换公钥攻击和AⅡ攻击者的KGC攻击。方案中在签名阶段没有任何双线性对运算,在验证阶段只有一个双线性对运算,并且不需要使用映射到点(Mapto Point)的特殊哈希函数。与已有方案相比,所提方案在计算量上更具优势。同时方案采用无证书公钥密码体制,解决了基于证书签名方案的证书管理问题和基于身份签名方案的密钥托管问题。 相似文献
11.
无证书公钥密码体制消除了基于身份公钥密码体制中固有的密钥托管问题,同时还保持了基于身份密码体制的优点。在随机预言模型下,在强k-CAA和Inv-CDHP假设下,基于双线性对提出了一种可证明安全的高效无证书签名方案。而且,该方案的签名长度大约为160bits,是最短的无证书方案。所以可以被广泛应用在低带宽的通信领域中。 相似文献
12.
Secure mediated certificateless signature scheme 总被引:1,自引:0,他引:1
YANG Chen MA Wen-ping WANG Xin-mei Ministry of Education Key Laboratory of Computer Networks Information Security Xidian University Xi’an China 《中国邮电高校学报(英文版)》2007,14(2):75-78
Ju et al. proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed. 相似文献
13.
Recently, He et al. proposed an efficient certificateless signature (CLS) scheme without pairings and demonstrated their scheme to be provably secure in the random oracle model. Unfortunately, Tian and Huang and Tsai et al. pointed out that the scheme cannot withstand a Type II adversary's attack. Tsai et al. also proposed an improved scheme to enhance security. However, the schemes of He et al. and Tsai et al. are not real CLS schemes because the user's public key is used to generate its partial private key. Besides, He et al. and Tsai et al. just demonstrated that their schemes are secure against the normal adversary in the random oracle model. In this paper, we propose a real CLS scheme and demonstrate that our scheme is secure against the super adversary. Security analysis and performance analysis show that our scheme could enhance security and increase computational cost slightly. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
14.
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identitybased cryptography. The certificateless signature scheme is studied widely as an important primitive. Following the pioneering work done by Al‐Riyami et al., many certificateless signature schemes using bilinear pairings have been proposed ever since. However, the relative computation cost of the pairing is approximately 20 times higher than that of the scalar multiplication over the elliptic curve group. To improve the performance we propose a certificateless signature scheme without bilinear pairings. With the running time being reduced greatly, our scheme is more practical than the previous related schemes for practical application. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
15.
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings 下载免费PDF全文
Jia‐Lun Tsai Nai‐Wei Lo Tzong‐Chen Wu 《International Journal of Communication Systems》2014,27(7):1083-1090
The certificateless signature (CLS) scheme is a special signature scheme that solves the key escrow problem in identity‐based signature schemes. In CLS schemes, the private key is generated cooperatively by the key generator center (KGC) and signer, such that a malicious KGC cannot masquerade as the signer and sign a message. He et al. in 2011 proposed an efficient CLS scheme without using bilinear pairings. However, we discovered that the CLS scheme by He et al. cannot resist a strong type 2 adversary if this adversary replaces the master public key of the KGC. This work proposes an improved scheme that overcomes this weakness. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献