对张玉磊等提出的高效无证书签名方案和该方案的安全性证明进行分析,证明该方案在公钥替换攻击下是不安全的,指出它的安全性证明存在严重缺陷。利用公钥替换攻击,敌手可以伪造任何用户对任意消息的签名,给出了详细的攻击方法。安全性证明的缺陷是,在利用Rafael和Ricardo分叉技术证明无证书签名方案在公钥替换攻击下安全性时,要求敌手知道所替换公钥对应的私钥。指出这种安全性证明缺陷在其他文献中也存在,分析了这种缺陷产生的原因,提出了改进措施。
Recently,Zhang et al.has proposed an efficient certificateless signature scheme and has given a formal security proof of the scheme.In this paper,it shows that the proposed scheme is insecure against public key replacement attacks,that is,an adversary can forge a valid signature for any message of any user under public key replacement attacks and the attack method is showed in detail.It is also pointed out that there exist fatal proof flaws in its security proof,and the security proof flaws is the adversary must know the secret key of the substituted public key in proving the security by the forking technique of Rafael and Ricardo.It is found that these flaws exist in other literature,and the flaws reasons are analyzed and the improvement measures are put forward.