Security Analysis and Improvements of Certificateless Aggregate Signature Schemes
-
摘要: 该文分析了He等人(2014)提出的无证书签名方案和Ming等人(2014)提出的无证书聚合签名方案的安全性,指出Ming方案存在密钥生成中心(KGC)被动攻击,He方案存在KGC被动攻击和KGC主动攻击。该文描述了KGC对两个方案的攻击过程,分析了两个方案存在KGC攻击的原因,最后对Ming方案提出了两类改进。改进方案不仅克服了原方案的安全性问题,同时也保持了原方案聚合签名长度固定的优势。Abstract: The security of certificateless signature scheme which was proposed by He et al. (2014) is analyzed, and the security of the certificateless aggregate signature scheme which was proposed by Ming et al. (2014) is analyzed too. It is pointed out that the Key Generation Center (KGC) can realize the passive attacks in the Mings scheme. It is also pointed out that KGC can realize the passive attack and initiative attack respectively in the Nimgs scheme. The processes of concrete forgery attacks which perfored by KGC are shown, and the possible reasons are analyzed. Finally, two improved Mings schemes are proposed. The improved schemes not only overcome the security problem of original scheme but also have an advantage that the length of aggregated signature is fixed.
-
Alriyami S S and Paterson K G. Certificateless public key cryptography[C]. Proceedings of the Cryptology-Asiacrypt, Taipei, China, 2003: 452-474. Liu Jing-wei, Zhang Zong-hua, and Chen Xiao-feng. Certificateless remote anonymous authentication schemes for wireless body area networks[J]. IEEE Transactions on Parallel Distributed Systems, 2014, 25(2): 332-342. 光焱, 顾纯祥, 祝跃飞, 等. 一种基于LWE问题的无证书全同态加密体制[J]. 电子与信息学报, 2013, 35(4): 988-993. Guang Yan, Gu Chun-xiang, Zhu Yue-fei, et al.. Certificateless fully homomorphic encryption based on LWE problem[J]. Journal of Electronics Information Technology, 2013, 35(4): 988-993. Zhang Lei, Wu Qian-hong, Josep Domingo-Ferrerc, et al.. Signatures in hierarchical certificateless cryptography: efficient constructions and provable security[J]. Information Sciences, 2014, 272: 223-237. Boneh D, Gentry C, Lynn B, et al.. Aggregate and verifiably encrypted signatures from bilinear maps[C]. Proceedings of the Cryptology-Eurocrypt, Warsaw, Poland, 2003: 416-432. Xiong Hu, Guan Zhi, Chen Zhong, et al.. An efficient certificateless aggregate signature with const pairing computations[J]. Information Sciences, 2013, 219: 225-235. He De-biao, Tian Miao-miao, and Chen Jian-hua. Insecurity of an ef?cient certi?cateless aggregate signature with constant pairing computations [J]. Information Sciences, 2014, 268: 458-462. 明洋, 赵祥模, 王育民. 无证书聚合签名方案[J]. 电子科技大学学报, 2014, 43(2): 188-193. Ming Yang, Zhao Xiang-mo, and Wang Yu-ming. Certificateless aggregate signature scheme[J]. Journal of University of Electronic Science and Technology of China, 2014, 43(2): 188-193. Gong Zheng, Long Yu, Hong Xuan, et al.. Two certificateless aggregate signatures from bilinear maps [C]. Proceedings of Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Qingdao, China, 2007: 188-193. Zhang Lei and Zhang Fu-tai. A new certificateless aggregation signature shceme[J]. Computer Communications, 2009, 32(6): 1079-1085. Au Man-ho, Mu Yi, Chen Jing,et al.. Malicious KGC attack in certificateless cryptography[C]. Proceedings of the ASIACCS2007, New York, USA, 2007: 302-311. 张福泰, 孙银霞, 张磊, 等. 无证书公钥密码体制研究[J]. 软件学报, 2011, 22(6): 1316-1332. Zhang Fu-tai, Sun Yin-xia, Zhang Lei, et al.. Research on certificateless public key cryptography [J]. Journal of Software, 2011, 22(6): 1316-1332. 喻琇瑛, 何大可. 一种新的无证书聚合签名[J]. 计算机应用研究, 2014, 31(8): 2485-2487. Yu Xiu-ying and He Da-ke. New certificateless aggregate signature scheme [J]. Application Research of Computers, 2014, 31(8): 2485-2487. 侯红霞,张雪锋,董晓丽. 改进的无证书聚合签名方案[J].山东大学学报(理学版), 2013, 48(9): 29-34. Hou Hong-xia, Zhang Xue-feng, and Dong Xiao-li. Improved certificateless aggregate signature scheme[J]. Journal of Shandong University (Natural Science), 2013, 48(9): 29-34. 期刊类型引用(21)
1. 李民,郭琳,姚雄. 优化高斯过程回归在太阳能集热效率预测上的应用. 电网与清洁能源. 2023(08): 127-131+138 . 百度学术
2. Han-shan Li. Recognition model and algorithm of projectiles by combining particle swarm optimization support vector and spatial-temporal constrain. Defence Technology. 2023(09): 273-283 . 必应学术
3. 何旭,席佩瑶,辛云宏. 基于代价敏感思想和自适应增强集成的SVM多分类算法. 微型电脑应用. 2023(09): 1-3 . 百度学术
4. 徐红先,张书玮. 基于极限学习机及多姿态信息融合的步态识别. 机械. 2023(11): 72-80 . 百度学术
5. 陈晓禾,曹旭刚,陈健生,胡春华,马羽. 基于三维卷积的帕金森患者拖步识别. 电子与信息学报. 2021(12): 3467-3475 . 本站查看
6. 雷建超,刘栋博,房玉,庄祖江,刘俊豪. 基于表面肌电信号的性别差异性手势识别. 中国医学物理学杂志. 2020(03): 337-341 . 百度学术
7. 金鑫,冯毅,尤雪汐,王佳欣. 基于机器学习的信息安全设备调配保障技术研究. 电子科技. 2020(08): 80-86 . 百度学术
8. 孟明,闫冉,高云园,佘青山. 基于多元变分模态分解的脑电多域特征提取方法. 传感技术学报. 2020(06): 853-860 . 百度学术
9. 王志芳,王书涛,王贵川. 粒子群优化BP神经网络在甲烷检测中的应用. 光子学报. 2019(04): 147-154 . 百度学术
10. 邹倩颖,王小芳. 粒子群优化BP神经网络在步态识别中的研究. 实验技术与管理. 2019(08): 130-133+138 . 百度学术
11. 郭海山,高波涌,陆慧娟. 基于Boruta-PSO-SVM的股票收益率研究. 传感器与微系统. 2018(03): 51-53+57 . 百度学术
12. 周长林,钱志升,王勤民,余道杰,程俊平. 基于PSO-SVM方法的电源线传导泄漏信号识别与还原. 电子与信息学报. 2018(09): 2206-2211 . 本站查看
13. 赵荣建,汤敏芳,陈贤祥,杜利东,曾华林,赵湛,方震. 基于光纤传感的生理参数监测系统研究. 电子与信息学报. 2018(09): 2182-2189 . 本站查看
14. 胡长俊,袁树杰. 煤矿井下WSN中基于自适应粒子群聚类算法的多sink节点部署. 计算机科学. 2018(11): 103-107+123 . 百度学术
15. 王秀娟,相从斌. 基于累积量的DoS攻击检测算法. 北京工业大学学报. 2017(09): 1328-1334 . 百度学术
16. 杜必强,孙立江. 基于PSO-SVM模型的焊接转子环焊缝超声缺陷识别. 动力工程学报. 2017(05): 379-385 . 百度学术
17. 赵湛,韩璐,方震,陈贤祥,杜利东,刘正奎. 基于可穿戴设备的日常压力状态评估研究. 电子与信息学报. 2017(11): 2669-2676 . 本站查看
18. 董广宇. 基于多特征融合的复杂路况步态识别方法. 科学技术与工程. 2017(08): 202-207 . 百度学术
19. 韩笑,佘青山,高云园,罗志增. 基于NA-MEMD和互信息的脑电特征提取方法. 传感技术学报. 2016(08): 1140-1148 . 百度学术
20. 黄成泉,王士同,蒋亦樟,董爱美. v-软间隔罗杰斯特回归分类机. 电子与信息学报. 2016(04): 985-992 . 本站查看
21. 徐超立,林科,杨晨,吴超华,高小榕. 基于小腿表面肌电的智能机器人协同控制方法. 中国生物医学工程学报. 2016(04): 385-393 . 百度学术
其他类型引用(43)
-
计量
- 文章访问数: 1759
- HTML全文浏览量: 223
- PDF下载量: 445
- 被引次数: 64