《计算机应用》唯一官方网站 ›› 2023, Vol. 43 ›› Issue (1): 147-153.DOI: 10.11772/j.issn.1001-9081.2021111919

所属专题: 网络空间安全

• 网络空间安全 • 上一篇    下一篇

无证书签名方案的分析与改进

赵洪1, 喻书涵2, 韩妍妍1,2, 李兆斌1   

  1. 1.北京电子科技学院 电子与通信工程系,北京 100070
    2.北京电子科技学院 网络空间安全系,北京 100070
  • 收稿日期:2021-11-15 修回日期:2022-05-06 发布日期:2023-01-12
  • 作者简介:赵洪(1978—),男,四川蓬溪人,讲师,博士研究生,主要研究方向:密码协议设计与分析;喻书涵(1999—),男,四川成都人,硕士研究生,主要研究方向:密码协议设计与分析、密码应用与测评 email:529429734@qq.com;韩妍妍(1982—),女,黑龙江哈尔滨人,副研究员,博士,主要研究方向:信息隐藏、可视密码、区块链;李兆斌(1977—),男,内蒙古锡林郭勒人,副研究员,博士,主要研究方向:密码应用与测评;
  • 基金资助:
    北京高校高精尖学科建设项目(20210048Z0402)。

Analysis and improvement of certificateless signature scheme

ZHAO Hong1, YU Shuhan2, HAN Yanyan1,2, LI Zhaobin1   

  1. 1.Department of Electronics and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
    2.Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Received:2021-11-15 Revised:2022-05-06 Online:2023-01-12
  • Contact: YU Shuhan, born in 1999, M. S. candidate. His research interests include cryptographic protocol design and analysis, cryptography application and evaluation.
  • About author:ZHAO Hong, born in 1978, Ph. D. candidate, lecturer. His research interests include cryptographic protocol design and analysis;HAN Yanyan, born in 1982, Ph. D., research associate. Her research interests include information hiding, visual cryptography, blockchain;LI Zhaobin, born in 1977, Ph. D., research associate. His research interests include cryptography application and evaluation;
  • Supported by:
    This work is partially supported by Beijing University Advanced Discipline Construction Project (20210048Z0402).

摘要: 针对汤永利等提出的9种无证书签名方案(汤永利,王菲菲,叶青,等.改进的可证明安全无证书签名方案.北京邮电大学学报,2016,39(1):112-116),首先使用线性化方程分析方法,发现所有方案中公钥之间存在线性关系,利用此缺陷完成对所有方案的签名伪造攻击;其次,为打破公钥之间的线性关系,使用改造哈希函数参数的方法改进方案,并在随机预言机模型下证明了改进方案的安全性;然后,提出一种无证书签名方案中的公钥构造格式,通过该格式构造出的签名方案无法被敌手进行公钥替换攻击;最后,通过仿真对改进方案与现有的无证书签名方案进行效率比较。实验结果表明,改进方案在提高安全性的同时未降低计算效率

关键词: 无证书签名, 线性化方程分析, 伪造攻击, 随机预言机模型, 可证明安全

Abstract: For nine certificateless signature schemes proposed by Y L Tang, et al. (TANG Y L, WANG F F, YE Q, et al. Improved provably secure certificateless signature scheme. Journal of Beijing University of Posts and Telecommunications, 2016, 39(1): 112-116), firstly, the linearized equation analysis method was used. It was found that there was a linear relationship between the public keys in all schemes. This defect was exploited to complete a signature forgery attack on all schemes. Secondly, in order to break the linear relationship between the public keys, the method of modifying the parameters of hash function was used to improve the scheme, and the security of the improved scheme was proved under the random oracle model. Thirdly, a public key construction format of certificateless signature scheme was proposed. The signature scheme constructed by this format could not be attacked by adversaries using public key replacement. Finally, the efficiency of the improved scheme was compared with those of the existing certificateless signature schemes through simulation. Experimental results show that the improved scheme promotes the security without reducing the computational efficiency.

Key words: certificateless signature, linearized equation analysis, forgery attack, random oracle model, provable security

中图分类号: