摘要
无证书公钥密码体制结合了基于身份和传统PKI公钥密码体制的优势,克服了基于身份公钥密码体制的密钥托管问题及PKI系统的证书管理问题,具有很高的效率。该文提出一个在随机预言机模型下可证明安全的无证书数字签名方案。该方案只需分别在系统初始化阶段、验证阶段预进行一次双线性对运算,而在签名阶段不需要进行计算。计算结果证明该方案比以往的无证书数字签名方案具有更高的计算效率和通信效率,且具有随机预言机模型下的可证明安全性。
Certificateless cryptography aims at combining the advantages of identity based and traditional certificate-based public key cryptography, so as to avoid the key escrow problem inherent in the identity based system and certificate management in public key infrastructure. In this paper, we propose a new efficient certificateless signature scheme and prove its security in the random oracle model. Furthermore, via pre-computing a bilinear pairing in the setup phase, our scheme only needs to compute one pairing in the verify stage. It is more efficient in computation complexity and communication complexity than that of many previous schemes.
引文
[1]SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO’84.Berlin:Springer-Verlag,1984.
[2]SAKAI R,OHGISHI K,KASAHARA M.Cryptosystems based on pairing[C]//Proceedings of Symposium on Cryptography and Information Security.Okinawa,Japan:[s.n.],2000.
[3]AL-RIYAMI S,PATERSON K G.Certificateless public key cryptography[C]//Advances in CryptologyASIACRYPT’03.Berlin:Springer-Verlag,2003.
[4]HUANG Xin-yi,WILLY SUSILO,YI MU,et al.On the security of a certificateless signature scheme from Asiacrypt2003[C]//4th International Conference on Cryptology and Network Security.Berlin:Springer-Verlag,2005.
[5]LI X,CHEN K,SUN L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lietuvos Matematikos Rinkinys,2005,45(1):76-83.
[6]JU H,KIM D,LEE D,et al.Efficient revocation of security capability in certificateless public key cryptography[C]//Knowledge-Based Intelligent Information and Engineering Systems.Berlin:Springer-Verlag,2005.
[7]YAP W,HENG S,GOI B.An efficient certificateless signature scheme[C]//Emerging Directions in Embedded and Ubiquitous Computing,EUC Workshops 2006.Berlin:Springer-Verlag,2006.
[8]ZHANG Zhen-feng,FENG Deng-guo.Key replacement attack on a certificateless signature scheme[EB/OL].http://eprint.iacr.org/2006/453.
[9]ZHANG Z,XU J,FENG D.Certificateless public-key signature:Security model and efficient construction[C]//Advances in ACNS 2006.Berlin:Springer-Verlag,2006.
[10]HE D,CHEN J,ZHANG R.An efficient and provably-secure certificateless signature scheme without bilinear pairings[J].International Journal of Communication Systems,2012,25(11):1432-1442.
[11]HE De-biao,CHEN Yi-tao,CHEN Jian-hua.An efficient certificateless proxy signature scheme without pairing[J].Mathematical and Computer Modelling,2013(57):2510-2518.