期刊文献+

一种新的前向安全无证书签名方案的设计 被引量:1

Design of a new forward security certificateless signature scheme
在线阅读 下载PDF
导出
摘要 针对无证书签名的密钥泄露问题研究出一种新的前向安全无证书签名方案。本方案主要通过定期更新用户的秘密值来提高前向安全性,与此同时保留了KGC文件生成用户公开公钥的特点来避免不诚实KGC文件中公钥与攻击替换的可能。在安全性分析中可见,该技术具备了较好的前向安全性,可有效辨别KGC文件的不诚实性行为,并防御不诚实KGC文件下的公钥替换攻击。 Aiming at the leakage of key of certificateless signature , this paper puts forward a new forward security certificateless signatur1scheme.This scheme is to regularly renew the clients'secret value to improve the security , and at the same time keep the character -istics of public key of the KGC document generation clients to avoid the possibility of substitution of public key by attack in the dishonest KGC document.The analysis of the security shows that the technology has good forward security and can effectively distinguish the dishonest behaviour of KGC document and prevent the possibility of substitution of public key by attack under the dishonest KGC document.
作者 魏彩霞
出处 《新余学院学报》 2014年第6期14-16,共3页 Journal of Xinyu University
关键词 前向安全 数字签名 无证书签名 不诚实性行为 forward security digital signature certificateless signature dishonest behaviour
  • 相关文献

参考文献6

二级参考文献50

  • 1纪家慧,李大兴,王明强.来自双线性配对的新的代理多签名、多代理签名和多代理多签名体制[J].计算机学报,2004,27(10):1429-1435. 被引量:21
  • 2MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delega- ting signing operation [ C ]//Proe of the 3 rd ACM Conference on Com- puter and Communications Security. New York: ACM, 1996 : 48-57.
  • 3BOLDYREVA A, PALACIO A, WARINSCHI B. Secure proxy signa- ture schemes for delegation of signing fights [ EB/OL ]. [ 2010-10- 17 ]. http://eprint. iacr. org/2003/096.
  • 4ANDERSON R. Two remarks on public key cryptology [ C ]//Proc of ACM CCCS'97. New York: ACM, 1997:1-7.
  • 5BELLARE M, MINER S K. A forward secure digital signature scheme [ C ]//Proc of the 19th Annual International Cryptology Conference on Advances in Cryptology. London:Springer-Verlag, 1999:431-448.
  • 6FIAT A, SHAMIR A. How to prove yourself: practical solutions of identification and signature problems [ C ]//Proc of Advances in Cryp- tology-CRYPTO'86. London : Springer-Verlag, 1987 : 186-194.
  • 7AL-RIYAMI S S, PATERSON K G. Certificateless public key cryp- tography[ C ]//Proc of Advance in Cryptography Asiacrypt. Berlin: Springer-Verlag, 2003:452-473.
  • 8HUANG Xin-yi,SUSILO W, MU Yi,et al. On the security of certifi- careless signature schemes from Asiacrypt 2003 [ C ]//Proc of the 4th International Conference on Cryptology and Network Security. Berlin: Springer-Verlag,2005 : 13-25.
  • 9Krohn M, Freedman M, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution [C]//Proceedings-2004 1EEE Symposium on Security and Privacy. Berkeley: IEEE Computer Society, 2004: 226-239.
  • 10Charles D, Jain K, Lauter K. Signatures for network coding [C]//2006 40th Annual Conference on Information Sciences and Systems. Princeton: Institute of Electrical and Electronics Engineers Inc, 2007: 857-863.

共引文献8

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部