異構(gòu)雙向簽密方案的安全性分析和改進
doi: 10.11999/JEIT170203
國家自然科學基金(61163038, 61262056),甘肅省高等學??蒲许椖?2015B-220, 2013A-014),西北師范大學青年教師科研能力提升計劃(NWNU-LKQN-14-7)
Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems
The National Natural Science Foundation of China (61163038, 61262056), The Higher Educational Scientific Research Foundation of Gansu Province of China (2015B-220, 2013A-014), The Young Teachers Scientific Research Ability Promotion Program of Northwest Normal University (NWNU- LKQN-14-7)
-
摘要: 異構(gòu)簽密可以保證異構(gòu)密碼系統(tǒng)之間數(shù)據(jù)的機密性和不可偽造性。2016年,劉景偉等人提出了傳統(tǒng)公鑰密碼和無證書公鑰密碼之間的PCHS和CPHS雙向異構(gòu)簽密方案。但是,經(jīng)過分析,發(fā)現(xiàn)PCHS方案和CPHS方案均不安全。首先描述了第2類敵手對兩個方案的攻擊過程,其次分析了兩個方案存在第2類敵手攻擊的原因,最后對PCHS方案和CPHS方案進行改進。改進方案克服了原方案的安全性問題,保證了傳統(tǒng)公鑰密碼和無證書公鑰密碼環(huán)境之間數(shù)據(jù)的安全傳輸。
-
關(guān)鍵詞:
- 簽密 /
- 異構(gòu)系統(tǒng) /
- KGC攻擊 /
- 選擇密文攻擊 /
- 選擇消息攻擊
Abstract: Heterogeneous signcryption can be used to guarantee the confidentiality and unforgeability in the different cryptography. In 2016, between traditional public key cryptography and certificateless public key cryptography, the mutual signcryption schemes including PCHS and CPHS were proposed by Liu et al. However, via the security analysis, it is shown that the above schemes are not secure. Firstly, the processes of attack performed by the second type of adversary are described. Secondly, the possible reasons why the second type of adversary can perform these attacks are analyzed. In the end, the original schemes are improved. The improved schemes can overcome the security weakness of the original schemes, and can also ensure the security of data transmission between traditional public key cryptographic and certificateless public key cryptography.-
Key words:
- Signcryption /
- Heterogeneous system /
- KGCs attack /
- Chosen cipertext attack /
- Chosen message attack
-
LIBERT B and QUISQUATER J J. Improved signcryption from q-Diffie-Hellman problems[C]. International Conference on Security in Communication Networks, Amalfi, Italy, 2004: 220-234. doi: 10.1007/978-3-540-30598-9_16. SUN Y X and LI H. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction[J]. Science China Information Sciences, 2010, 53(3): 557-566. doi: 10.1007/s11432-010-0061-5. HUANG Q, WONG D S, and YANG G M. Heterogeneous signcryption with key privacy[J]. The Computer Journal, 2011, 54(4): 525-536.doi: 10.1093/comjnl/bxq095. FU X T, LI X W, and LIU W. IDPKC-to-TPKC construction of multi-receiver signcryption[C]. International Conference on Intelligent Networking and Collaborative Systems (INCoS), Xi,an, China, 2013: 335-339. doi: 10.1109/INCoS.2013.62. LI F G, ZHANG H, and TAKAGI T. Efficient signcryption for heterogeneous systems[J]. IEEE Systems Journal, 2013, 7(3): 420-429. doi: 10.1109/JSYST.2012.2221897. 張玉磊, 張靈剛, 張永潔, 等. 匿名CLPKC-TPKI異構(gòu)簽密方案[J]. 電子學報, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. ZHANG Y L, ZHANG L G, ZHANG Y J, et al. CLPKC to TPKI heterogeneous signcryption scheme with anonymity[J]. Acta Electronica Sinica, 2016, 44(6): 2432-2439. doi: 10.3969/ j.issn.0372-2112.2016.10.022. LI F G, HAN Y N, and JIN C H. Practical signcryption for secure communication of wireless sensor networks[J]. Wireless Personal Communications, 2016, 89(4): 1391-1412. doi: 10.1007/s11277-016-3327-4. 劉景偉, 張俐歡, 孫蓉. 異構(gòu)系統(tǒng)下的雙向簽密方案[J]. 電子與信息學報, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT 160056. LIU J W, ZHANG L H, and SUN R. Mutual signcryption schemes under heterogeneous systems[J]. Journal of Electronics Information Technology, 2016, 38(11): 2948-2953. doi: 10.11999/JEIT160056. AN J H, DODIS Y, and RABIN T. On the security of joint signature and encryption[C]. Proceedings of the Cryptology- EUROCRYPT 2002, Amsterdam, the Netherlands, 2002: 83-107. doi: 10.1007/3-540-46035-7_6. ZHANG L, WU Q H, QIN B, et al. Identity-based authenticated asymmetric group key agreement protocol[J]. Journal of Computer Research Development, 2010, 6196(19): 510-519. doi: 10.1007/978-3-642-14031-0_54. -
計量
- 文章訪問數(shù): 1089
- HTML全文瀏覽量: 144
- PDF下載量: 200
- 被引次數(shù): 0