期刊文献+

对Schnorr签名方案几种攻击的分析 被引量:1

Analysis of Some Attacks against the Schnorr Signature Scheme
下载PDF
导出
摘要 Schnorr签名方案是一个基于离散对数的数字签名方案。最近,一些文献提出了新的攻击该签名方案的方法,并声称这些新的攻击成功率很高。分析了这些攻击方法,认为这些新的攻击本质上是平凡的穷搜索攻击。在系统给定的安全参数下,这些攻击成功的概率是可以忽略的。还指出了这些攻击成功率分析中的错误。 The Schnorr signature scheme is a digital signature scheme based on discrete logarithms. Recently some attacks against the Schnorr signature scheme were presented in the literature and they claimed that these new attacks had the greater success probability. However, these attacks were analyzed and the conclusion is that all these new attacks are essentially trivial exhaust search ones. Given certain system security parameters, the success probability of theses attacks is negligible. Moreover, some mistakes in the probability analysis of these attacks were pointed out.
作者 胡国政 洪帆
出处 《计算机科学》 CSCD 北大核心 2009年第10期98-100,共3页 Computer Science
基金 国家自然科学基金项目(60703048) 湖北省自然科学基金项目(2007ABA313)资助
关键词 SCHNORR签名 密码分析 穷搜索攻击 Schnorr signature,Cryptanalysis,Exhaust search attack
  • 相关文献

参考文献13

  • 1Diffie W, Hellman M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.
  • 2Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21 (2) : 120-126.
  • 3Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen message attacks[J]. SIAM Journal on Computing, 1988,17 (2) : 281-308.
  • 4Bellare B, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols [ A]// 1 st ACM Conference on Computer and Communications Security[C]. ACM Press, 1993: 62-73.
  • 5Bellare B, Rogaway P. The exact security of digital signatures: How to sign with RSA and Rabin [A]//Advances in Cryptology-EUROCRYPT'96[C]. LNCS 1070. Berlin: Springer-Verlag, 1996 : 399-416.
  • 6Zhu H. New digital signature scheme attaining immunity against adaptive chosen message attack[J]. Chinese Journal of Electronics, 2001,10(4) : 484-486.
  • 7Camenisch J, Lysyanskaya A. A signature scheme with efficient protocols [A] // Security in Communication Networks (SCN 2002) [C]. LNCS 2676. Berlin: Springer-Verlag, 2002 : 268-289.
  • 8Fischlin M. The Cramer - Shoup strong - RSA signature scheme revisited[A]//Desmedt Y G, ecl. Public Key Cryptography-PKC 2003[C]. LNCS2567. Berlin: Springer-Verlag, 2003 : 116-129.
  • 9Schnorr C P. Efficient identification and signatures for smart cards[A] // Advances in Cryptology-CRYPT0 ' 89 [C]. LNCS 435. Berlin: Springer-Verlag, 1990 : 239-252.
  • 10Schnorr C P. Efficient signature generation by smart cards[J]. Journal of Cryptology, 1991,4 : 161-174.

二级参考文献23

  • 1Rivest R L,Shamir A,Adleman L M. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978,21(2) : 120-126
  • 2EIGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. Advances in Cryptology-CRYPTO'84 Proceedings,Springer-Verlag, 1985. 10-18
  • 3Tsiounis Y,Yung M. On the Security of EIGamal Based Encryption. Springer-Verlag, 1998,1431 : 117
  • 4Jakobsson M,Juels A. Addition of EIGamal Plaintexts. Springer-Verlag, 2000,1976 : 346
  • 5Bleichenbacher D. Generating EIGamal Signatures without Knowing the Secret Key. Springer-Verlag, 1996,1070:10
  • 6Shparlinski L E. On the Uniformity of Distribution of the EIGamal Signature. Springer-Verlag, 13 ( 1 ) : 9-16
  • 7Ferreira L C,Dahab R. Optimistic Blinded-Key Signatures for El-Gamal and Related Schemes. Spfinger-Verlag, 2004,3824: 254
  • 8Schnorr C P. Efficient signature generation for smart cards. Advances in cryptolngy-crypto ' 89 proceedings, Springer-Verlag,1991. 239-252
  • 9Schnorr C P. Security of Blind Discrete Log Signatures against Interactive Attacks. Springer-Verlag,2001,2229:1
  • 10Nguyen P Q,Shparlinski I E. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology, 15(3) : 151- 176

共引文献3

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部