通过对黄明军(2011)等人提出的无证书签名方案进行安全性分析,发现该签名方案至少能够受到三种攻击,攻击者能够做到对任意选择的消息成功伪造签名.分析了出现这些攻击的根本原因,并给出了一个改进方案.改进后的签名方案不仅克服了上述三种攻击方法,而且在随机预言机模型下证明了安全性是基于CDH和Inv-CDH困难性问题.最后,通过比较发现改进后的签名方案不仅签名长度更短、效率更高,而且信任级别达到了最高级(第3级)等优点.
The certificateless signature scheme, proposed by Huang Mingjun (2011) etc., is analyzed and shown that the scheme can at least suffer from three types of attack so that an attacker can forge a valid signature on any message. The fundamental reason of these attacks is provided and also an improved scheme is proposed without the above three types of attack. Under the random oracle model, the improved scheme is proved to be based on the CDH and Inv-CDH assumptions. Finally, compared with some certificateless schemes, the improved scheme is shorter in the length of the signature and more efficient in efficiency. Moreover, the trust level of the scheme can a- chieve the superlative degree, trust level 3.