An improved and provable self-certified digital signature scheme with message recovery

被引:13
作者
Wu, Fan [1 ]
Xu, Lili [2 ]
机构
[1] Huaqiao Univ, Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[2] Xiamen Univ, Sch Informat Sci & Technol, Xiamen 361005, Peoples R China
关键词
self-certified; message recovery; digital signature; man-in-middle attack; random oracle; PUBLIC KEYS;
D O I
10.1002/dac.2673
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a self-certified digital signature scheme with message recovery that is proven to be secure. So far, many schemes of this kind have been proposed to keep message secret in the transmission. But Zhang et al. has proposed the man-in-middle attack to Shao's self-certified signature scheme, which is based on discrete logarithm. The attacker can make a new signature by using an old one, but the reason of such man-in-middle attack was not referred. We present the scheme of Yoon et al., which is also based on discrete logarithm, that cannot resist man-in-middle attack either, give the analysis of the attack, and propose a new scheme. The proposed scheme can resist forgery attack in the random oracle model and avoid message leakage, the man-in-middle attack, and meanwhile has several security characters. Compared with some self-certified schemes, our scheme is the best because of the time cost. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:344 / 357
页数:14
相关论文
共 23 条
[1]  
Abes M, 1999, ADV CRYPTOLOGY ASIAC, P378
[2]   Digital signature with message recovery using self-certified public keys without trustworthy system authority [J].
Chang, YF ;
Chang, CC ;
Huang, HF .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) :211-227
[3]   A new provably secure certificateless short signature scheme [J].
Choi, Kyu Young ;
Park, Jong Hwan ;
Lee, Dong Hoon .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 61 (07) :1760-1768
[4]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490
[5]   Further improvement of a certificateless signature scheme without pairing [J].
Gong, Peng ;
Li, Ping .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :2083-2091
[6]  
Hes D, 2012, INT J COMMUNICATION, V25, P1432, DOI DOI 10.1002/DAC.1330
[7]  
Lins HY, 2011, INFORM PROCESSING LE, V111, P661
[8]  
Lockes G, 2009, FEDERAL INFORM PROCE
[9]  
Lvs J, 2005, APPL MATH COMPUT, V169, P1285
[10]  
NYBERG K, 1994, ADV CRYPTOLOGY EUROC, P182