摘要
分析了Huang等提出的1个完美并发签名协议,设计了2种攻击方法对该协议进行攻击.结果表明,该方案存在2个安全漏洞:参与的两方A和B都有能力在并发签名产生之后伪造1个对新消息的签名;A与B都有能力独自伪造双方的并发签名.为了防止上述的伪造攻击,提出了1个改进方案,增加对关键信息的认证,并分析了改进方案的安全性.
A perfect concurrent signature protocol proposed by Huang et al in 2007 is analyzed. I wo attacks are given out to show that there are two weaknesses in Huang's protocol: firstly, both participators A and B can change the signed messages after the concurrent signature protocol is completed; secondly, both A and B can forge a concurrent signature themselves. To prevent such forgery attacks, an improved protocol is proposed by adding authentication to the keystone information, and then the security of the improvement is analyzed.
出处
《北京邮电大学学报》
EI
CAS
CSCD
北大核心
2009年第2期115-118,共4页
Journal of Beijing University of Posts and Telecommunications
基金
国家自然科学基金项目(60873232)
山东省自然科学基金项目(Y2007G37)
山东省科学攻关计划项目(2007GG10001012)
关键词
并发签名
完美并发签名
公平合同签署
环签名
concurrent signature
perfect concurrent signature
fair contract signing
ring signature