现代信息科技2024,Vol.8Issue(8) :182-185.DOI:10.19850/j.cnki.2096-4706.2024.08.039

一个常数长度的无证书聚合签名方案的攻击与改进

Attack and Improvement on a Certificateless Aggregate Signature Scheme with Constant Length

刘莉
现代信息科技2024,Vol.8Issue(8) :182-185.DOI:10.19850/j.cnki.2096-4706.2024.08.039

一个常数长度的无证书聚合签名方案的攻击与改进

Attack and Improvement on a Certificateless Aggregate Signature Scheme with Constant Length

刘莉1
扫码查看

作者信息

  • 1. 安徽机电职业技术学院 公共基础教学部,安徽 芜湖 241002
  • 折叠

摘要

Hashimoto和Ogata提出了一个基于双线性对的签名长度为固定常数的无证书聚合签名方案,在随机预言机模型下,证明该方案对Normal-Ⅰ类敌手和Ⅱ类敌手是安全的,方案的安全性可归约为CDH困难问题.忽略了Super-Ⅰ类敌手的攻击是不安全的,首先证明了该方案容易受到Super-Ⅰ类敌手的攻击,并给出了抵抗这类攻击的改进方案.新方案依赖于签名者的个数,长度为n+1,双线对运算次数为 2n+1,与原方案相比,虽然运算略有增加,但是安全性提升,能够抵抗所有Ⅰ类敌手和的Ⅱ类敌手的攻击.

Abstract

Hashimoto and Ogata propose a certificateless aggregate signature scheme with a fixed signature length based on bilinear pairings.The safety of the protocol can be attributed to the CDH difficulty problem,and it is proved that the scheme is safe for the Normal-Ⅰ and Ⅱ adversaries in the random oracle model.It is unsafe to ignore the attack of Super-Ⅰ adversary.Firstly,it is proved that this scheme is vulnerable to the attack of Super-Ⅰ adversary,and an improved scheme to resist this attack is given.The new scheme depends on the number of signers,the length is n+1,and the number of operations of the bilinear pairings is 2n+1.Compared with the original scheme,although the operation is slightly increased,the security is enhanced,and it can resist the attacks of all Class Ⅰ and Class Ⅱ adversaries.

关键词

无证书签名/聚合签名/CDH问题/Ⅰ类敌手/Ⅱ类敌手

Key words

certificateless signature/aggregate signature/CDH problem/Class Ⅰ adversary/Class Ⅱ adversary

引用本文复制引用

基金项目

安徽省高等学校自然科学研究重点项目(KJ2020A1107)

安徽省高等学校自然科学研究重点项目(KJ2021A1523)

安徽省质量工程项目(2020kfkc158)

出版年

2024
现代信息科技
广东省电子学会

现代信息科技

ISSN:2096-4706
参考文献量5
段落导航相关论文