信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 17-20.doi: 10.3969/j.issn.1671-1122.2014.08.003

• 技术研究 • 上一篇    下一篇

一种基于身份的代理签名方案的安全性分析及改进

张键红, 甄伟娜   

  1. 北方工业大学理学院,北京100041
  • 收稿日期:2014-06-27 出版日期:2014-08-01
  • 作者简介:张键红(1975-),男,河北,副教授,博士,主要研究方向:密码学;甄伟娜(1988-),女,河北,硕士研究生,主要研究方向:密码学。
  • 基金资助:
    北京市自然科学基金[4122024,4132056]

Security Analysis and Improvement of ID-based Proxy Signature

ZHANG Jian-hong, ZHEN Wei-na   

  1. College of Science, North China University of Technology, Beijing 100041, China
  • Received:2014-06-27 Online:2014-08-01

摘要: 随着基于公钥密码体制的数字签名技术的发展,密钥管理问题成为数字签名技术能否广泛应用的关键所在,简化密钥管理成为数字签名技术发展的新方向。因此,基于身份的数字签名被提出,它简化了密钥管理工作,具有签名长度短的优点。之后,密码学界将双线性映射应用于基于身份的数字签名,它有效简化了证书密钥管理和密钥分发问题。随后,各种基于身份的数字签名的变种方案被提出,如基于身份的代理签名、基于身份的盲签名、基于身份的环签名和基于身份的门限签名等。文章主要内容为基于身份的代理签名。文章通过对王泽成等人的基于身份的代理签名方案进行分析,展示出这种方案是不安全的,尽管这种方案在随机预言机模型下被证明是安全的。此外,该方案不满足不可伪造性,原始授权人能够伪造一个合法有效的代理签名,代理人也可以滥用其代理签名权利。文章在此基础上提出了改进方案,新方案克服了原方案的安全缺陷,也满足了代理签名的各种安全性要求。

关键词: 基于身份, 代理签名, 双线性映射, 安全性分析

Abstract: With the development of digital signatures based on public key cryptography, key management issue decides whether digital signature technology can be widely used or not, simplifing key management becomes the new development direction of digital signature. Thus, Identity-based digital signature is proposed, which simplifies the work of key management, with the advantage of a short signature. After that, the bilinear mapping is applied to identity-based digital signature in cryptographic filed, which effectively simplifies the certificates key management and key distribution problem. Subsequently, a variety of identity-based digital signature variant schemes have been proposed, such as identity-based proxy signature, identity-based blind signature, identity-based ring signature and identity-based threshold signature and so on. The main content in this paper is identity-based proxy signature. According to the analysis of identity-based proxy signature scheme made by Wang, this paper demonstrates this solution is unsafe, although such program is proven to be secure under the random oracle model in existing references. Otherwise, the program does not meet the unforgeability, the original signer can forge a legal and valid proxy signature, proxy signer can also abuse proxy signature right. On this basis, this paper improves the original program, not only overcomes the deficiencies of the original program, but also meets the various security needs of proxy signature.

Key words: identity-based, proxy signature, bilinear mapping, security analysis

中图分类号: