无证书签名体制容易遭受公钥替换攻击,在很多已有的方案中,密钥生成中心(KGC)可假冒合法用户生成"有效"的公私钥对。在Gap Diffie-Hellman(GDH)群中,利用用户公钥和部分私钥"绑定"技术,提出了一种可追踪KGC假冒的无证书签名方案,在随机谕示模型下,给出了该方案的安全性分析。与同类方案相比,该方案具有较高的效率。
Many certificateless schemes can’t resist the public key substitution attack, and a dishonest Key Generating Center(KGC)may pretend to be a user with identity ID and try to obtain a valid private key. Using Gap Diffie-Hellman(GDH)groups, a certificateless scheme is proposed which can trace a malicious KGC through binding public key with user’s partially private key. The new scheme is proved to be secure under the random oracle model. It is also efficient in signature generation and verification.