摘要
2004年,Chang等提出了一种不使用单向Hash函数和消息冗余度的数字签名方案.但是Zhang指出他们的方案存在伪造攻击.为了克服Zhang的攻击,Zhang等基于Chang的签名方案提出了一个改进方案,并且对改进的签名方案进行了安全性分析.然而,通过给出一种简单的攻击,指出Zhang等的方案仍是不安全的.为了抵抗这种攻击,Hash函数和消息冗余度可能仍旧需要作用.
In 2004, Chang, et al. proposed a digital signature scheme without using one-way hash function and message redundancy schemes. But Zhang showed that the scheme can be forged. In order to overcome Zhang's attack, Zhang, et al. demonstrated an improved signature scheme based on Chang, et al. 's signature scheme and analyzed the security of the improved scheme. But in this paper, we identify a simple attack to show Zhang, et al. ' s scheme is still not secure. To resist this attack, the hash function and message redundancy schemes may be still used.
出处
《中国科学院研究生院学报》
CAS
CSCD
2008年第5期698-700,共3页
Journal of the Graduate School of the Chinese Academy of Sciences
基金
National Natural Science foundation of China(60573053,60373041)
Bejing Jiaotong University Science and Technology Research Program(2007RC062,2007XM006)
关键词
数字签名
消息恢复
冗余度
HASH函数
digital signature, message recovery, redundancy message, hash message