摘要
对邵国金等人(四川大学学报(工程科学版),2012年第1期)提出的基于椭圆曲线离散对数难题(ECDLP)的无双线性对运算的部分盲签名方案进行安全性分析,发现方案不能抵抗公钥替换攻击.为此,提出了一个改进方案.在随机谕言模型下证明了改进方案对自适应选择消息和身份攻击是存在性不可伪造性的.将所提方案与部分现有的无证书部分盲签名方案的计算性能进行了比较,结果显示改进方案具有较高的运算效率.
Security analysis of the certificateless partially blind signature scheme based on the elliptic curve discrete logarithm problem which is proposed by Shao G Jet al.shows that the scheme is insecure against public key replacement attack.An improved scheme was proposed.The improved scheme was proved to be existentially unforgeable against adaptive chosen message and identity attacks in random oracle model.Efficiency analysis results show that the improved scheme has better computational efficiency.
引文
[1]Chaum D.Blind signatures for untraceable payments[C]//Advances in Cryptology-CRYPTO'82.New York:Plenum Press,1983,199-203.
[2]Abe M,Fujisaki E.How to date blind signatures[C]//Advances in Cryptology-ASIACRYPTO'96.LNCS 1163,Berlin:Springer-Verlag,1996:244-251.
[3]Shamir A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYP TO'84.Berlin:Springer-Verlag,1984,47-53.
[4]A1-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//Advances in CryptologyASIACRYPT'03,LNCS 2894.Berlin:Springer-Verlag,2003,452-473.
[5]张福泰,孙银霞,张磊,等.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332.
[6]荣维坚.无证书部分盲签名方案[J].漳州师范学院学报(自然科学版).2008,21(4):44-47.
[7]余丹,杨晓元,黄大威.新的无证书部分盲签名方案[J].计算机应用研究.2010,27(11):4319-4321.
[8]Zhang L,Zhang.F,Qin B,et al.Provably-secure electronic cash based on certificateless partiallyblind signatures[J].Electronic Commerce Research and Applications,2011,5(10):545-552.
[9]汤鹏志,李晓雄,左黎明,等.高效安全无证书部分盲签名[J].计算机工程与设计.2013,34(2):439-446.
[10]Liu J,Zhang Z,Sun R,et al.Certificateless Partially Blind Signature[C]//Advanced Information Networking and Applications Workshops(WAINA),2012 26th International Conference on.IEEE,2012:128-133.
[11]邵国金,薛冰,陈明.基于椭圆曲线DLP问题的无证书部分盲签名机制[J].四川大学学报(工程科学版),2012,44(1):112-117.
[12]Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396.