期刊文献+

一种按序多重数字签名方案的安全性分析及改进 被引量:3

Cryptanalysis and Improvement of Sequential Multi-signature Scheme
下载PDF
导出
摘要 针对最近提出的一种基于RSA的按序多重数字签名方案,提出了两种伪造攻击,使得签名者(U1,U2,U3,…,Un)中任一个签名者Ui都可以伪造前面个i-1签名者的多重数字签名,或签名者Ui,Uj(i<j)合谋可以使(Ui+1,Ui+2,…,Uj-2,Uj-1)不对消息M签名但又使以后的签名者及验证者无法验证出。提出了一种经过改进的按序多重数字签名方案,改进后的方案具有更高的安全性和效率。 Two forgery attacks on a recent sequential multi-signature scheme based on RSA and hash function are proposed.Anyone of n signers can produce a valid signature of the preceding signers before him;the signers U_i,U_j(i<j)can make the signersU_(i+1),U_(i+2),U_(j-2),U_(j-1)not sign the document and pass the latter signers and verifier's verification.An improved sequential multi-signature scheme is put forward.The new scheme has advantages of high security and efficacy.
出处 《河南科技大学学报(自然科学版)》 CAS 2005年第1期31-34,共4页 Journal of Henan University of Science And Technology:Natural Science
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基金资助项目(2002A03) 陕西师范大学重点项目
关键词 多重数字签名 RSA 安全性分析 伪造攻击 方案 消息 验证 对消 Digital multi-signature Discrete logarithm question Sequential multi-signature Forgery attack
  • 相关文献

参考文献8

  • 1李子臣,杨义先.ElGamal多重数字签名方案[J].北京邮电大学学报,1999,22(2):30-34. 被引量:42
  • 2Harn L.New Digitial Signature Scheme Based on Discrete Logarithm [J].Electronic Letters,1994,30(5):396-397.
  • 3Hardjono T,Zheng Y.A Practical Diditial Multisignature Scheme on Discrete Logarithm[A].Advances in Cryptology-AUSCRIPTO'92[C].Berlin:Spring-Verlag,1992:16-21.
  • 4王晓明.一种多重数字签名方案的安全性分析[J].南开大学学报(自然科学版),2003,36(1):33-38. 被引量:21
  • 5BOYD C.Multi-Signature Based on Zero Knowledge Schemes[J].Electronic Letter,1991,27(22):2002-2004.
  • 6HAML,KIELSER T.New Scheme for Digital Multi-Signature[J].Electronic Letter,1989,25(15):1001-1003.
  • 7WU T C,CHOU S L.Two ID-Based Multi-Signature Protocols for Sequential and Broadcasting Architecture[J].Computer Communications,1996,19(2):851-856.
  • 8张键红,韦永壮,王育民.基于RSA的多重数字签名[J].通信学报,2003,24(8):150-154. 被引量:34

二级参考文献11

  • 1李子臣 杨义先.ELGama1多重数字签名方案[M].北京:北京邮电大学学报,1999 22.30-34.
  • 2LTAKURA K, NAKAMURA K. A public key cryptosystem suitable for digital multi-signature[J]. NEC Res and Develop,1983,71(10): 1-8.
  • 3BOYD C, Multi-signature based on zero knowledge schemes[J], Electronic Letter, 1991,27(22): 2002-2004.
  • 4HARDJONO T, ZHENG Y .A practical digital multi-signature scheme based on discrete logarithm[A]. Advances in Cryptology-AUSCRPTO's92[C]. Springer-verlag, 1993. 16-21.
  • 5HAM L, KIELSER T. New scheme for digital multi-signature[J] .Electronic Letter, 1989, 25 (15): 1002-1003.
  • 6OKAMOTO T. A digital multi-signature scheme using bi-jective public key cryptosystems[.I]. ACM Trans Computer system,1988,6(8): 432-441.
  • 7WU T C, CHOU S L. Two ID-base, d multi-signature protocols for sequential and broadcasting architecture[J]. Compter Communications, 1996, 19(2): 851-856.
  • 8HONG G, YANG C S. Key authentication scheme for cryptosystem based on discrete logarithms[J] .Comp Comm 1996, 19(4): 848-850.
  • 9Wu Tzongchen,Computer Commun,1996年,19卷,851页
  • 10Harn L,Electron Lett,1994年,30卷,24期,2025页

共引文献73

同被引文献30

  • 1刘天宁,张艳硕,刘宁.基于ISRSAC的两类代理多重数字签名方案[J].北京电子科技学院学报,2022,30(1):94-103. 被引量:2
  • 2韩小西,王贵林,鲍丰,任奎.针对基于离散对数多重签名方案的一种攻击[J].计算机学报,2004,27(8):1147-1152. 被引量:24
  • 3Ohta K and Okamoto T. Multisignature schemes secure against active insider attacks [J]. IEICE Trans. on Fundamentals, 1999, E82-A(1): 21-31.
  • 4Lin C Y, Wu T C, and Zhang F. A structured multisignature scheme from the gap Diffie-Hellman group. Cryptology ePrint Archive Listing for 2003, Report no 90. http://eprint. iacr .org/2003/090.pdf, 2003.
  • 5Lysyanskaya A, Micali S, and Reyzin L. Sequential aggregate signatures from trapdoor permutations. Proceedings of Eurocrypt 2004, Springer-Verlag, 2004, LNCS 3027: 74-90.
  • 6Boneh D, Gentry C, and Lynn B. Aggregate and verifiably encrypted signatures from bilinear maps. EUROCRYPT 2003, Springer-Verlag, 2003, LNCS 2656: 416-432.
  • 7Cheng X, Liu J, and Wang X. Identity-based aggregate and verifiably encrypted signatures from bilinear pairing. Computational Science and Its Applications ICCSA 2005, Springer-Verlag, 2005, LNCS 3483: 1046-1054.
  • 8Shao Zuhua. On the sequentiality of three optimal structured multisignature schemes [J]. ISPEC 2007, Springer-Verlag, 2007, LNCS 4464: 105-115.
  • 9Shamir A. Identity-based cryptosystems and signature schemes. CRYPTO' 84, Springer-Verlag, 1985, LNCS 196: 47-53.
  • 10Wang Lihua, Okamoto Eiji, and Miao Ying, et al.. ID-based series-parallel multisignature schemes for multi-messages from bilinear maps. WCC 2005, Springer-Verlag, 2006, LNCS 3969: 291-303.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部