期刊文献+

基于身份的强指定验证者签名的安全分析 被引量:1

Cryptanalysis of an ID-Based Designated Verifier Signature Schemes
下载PDF
导出
摘要 针对基于身份的强指定验证者签名方案是不可授权的结论和基于身份的指定验证者代理签名方案设计,对两个方案进行安全性分析,首先证明了基于身份的指定验证者方案的签名是可授权的,然后证明了基于身份的指定验证者代理签名方案的签名是可伪造的,说明基于身份的强指定验证者签名方案的结论是不安全的;而基于身份的指定验证者代理签名方案的设计是不合理的。 Compared with ordinary digital signature, the designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. In designated verifier signature scheme, no third party can even verify the validity of a designated verifier signature since it must use the designated verifier's secret key in verification. Recently, an ID-based strong designated verifier scheme, ID-based designated verifier proxy signature scheme, and partial cryptanalysis ware proposed. In this paper, we show that the designated verifier signature scheme is delegatable, and the designated verifier proxy signature is forgeable since construction of the proxy scheme is unreasonable.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2009年第5期712-715,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60803133) 博士点基金(200806140010)
关键词 攻击 授权 指定验证者签名 代理签名 attack delegatability designated verifier signature proxy signature
  • 相关文献

参考文献15

  • 1JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications[C]//Advances in Cryptology-EuroCrypt. Berlin: Springer Heidelberg, 1996: 143-154.
  • 2SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme[C]//The international conference on information security and cryptology. Seoul: Swinger Berlin\Heidelberg, 2003: 40-54.
  • 3LAGUILLAUMIE F, VERGNAUD D. Designated verifier signatures: anonymity and efficient construction from any bilinear map[C]//The Sixth Conference on Security and Cryptography for Networks. Amalfi: Springer, Berlin/Heidelberg 2004:105-119.
  • 4HUANG X, SUSILO W, MU Y, et al. Short(identity-based) strong designated verifier signature schemes[C]//The Information Security Practice and Experience Conference. Hangzhou: Springer Berlin/Heidelberg, 2006:214-225.
  • 5SUSILO W, ZHANG F, MU Y. Identity-based strong designated verifier signature schemes[C]//The Conference on Information Security and Privacy. Sydney: Springer Berlin / Heidelberg 2004, 313-324.
  • 6KANG B, BOYD C, DAWSON E. Identity-based strong designated verifier signature schemes: attacks and new construction[J]. Computers and Electrical Engineering, 2009, 35: 49-53.
  • 7LIPMAA H, WANG G, BAO F. Designated verifier signature schemes: attacks, new security notions and a new construction[C]//Intemational Colloquium on Automata, Languages and Programming. Lisboa: Springer Berlin/Heidelberg, 2005:459-471.
  • 8SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme[C]//The International Conference on Information Security and Cryptology. Seuol: Springer, Berlin/Heidelberg, 2003: 40- 54.
  • 9LAGUILLAUMIE F, VERGNAUD D. Designated verifier signatures: anonymity and efficient construction from any bilinear map[C]//The Conference on Security and Cryptography for Networks. Amalfi: Springer Berlin/膜 Heidelberg, 2004:105-119.
  • 10STEINFELD R, WANG H, PIEPRZYK J. Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures[C]//Public Key Cryptography. Singapore: Springer Berlin/Heidelberg, 2004: 86-100.

二级参考文献13

  • 1JAKOBSSON M, SAKO K, IMPAGLIAZZO R. Designated verifier proofs and their applications [C]// Proceedings of Eurocrypt' 96. Zaragoza: Springer-Verlag, 1996: 143-154.
  • 2SAEEDNIA S, KREMER S, MARKOWITCH O. An efficient strong designated verifier signature scheme [C]// The 4th International Conference on Information Security and Cryptology (ICISC' 03). Seoul: Springer-Vetlag, 2003: 40-54.
  • 3LAGUILLAUMIE F,VERGNAUD D. Designated verifier signatures: anonymity and efficient construction from any bilinear map [C]// The Fourth Conference on Security in Communication Networks (SCN'04). Amalfi: Springer-Verlag, 2004 : 105 - 119.
  • 4HUANG X, SUSILO W, MU Y, et al. Short (identitybased) strong designated verifier signature schemes [C]//The 2nd Information Security Practice and Experience Conference ( ISPEC ' 06 ). Hangzhou:Springer- Verlag, 2006:214 - 225.
  • 5SUSILO W, ZHANG F, MU Y. Identity-based strong designated verifier signature schemes[C]// The 9th Australasian Conference on Information Security and Privacy (ACISP' 04). Sydney: Springer-Verlag, 2004: 313- 324.
  • 6LIPMAA H, WANG G, BAO F. Designated verifier signature schemes: attacks, new security notions and a new construction [C]// The 32nd International Colloquium on Automata, Languages and Programming (ICALP' 05). Lisboa: Springer-Verlag, 2005:459-471.
  • 7STEINFELD R, BULL L, WANG H, et al. Universal designated-verifier signatures [C]// Proceedings of ASIACRYPT'03. Taipei: Springer-Verlag, 2003:523 - 543.
  • 8STEINFELD R, WANG H, PIEPRZYK J. Efficient extension of standard Schnorr/RSA signatures into universal designated verifier signatures [C]// Proceedings of Conference on Public Key Cryptography (PKC'04). Singapore: Springer-Verlag, 2004: 86- 100.
  • 9LI Y, LIPMAA H, PEI D. On delegatability of four designated verifier signatures [C]// The 2005 International Conference on Information and Communications Security (ICICS' 05). Beijing: Springer-Verlag, 2005: 61- 71.
  • 10ZHANG R, FURUKAWA J, IMAI H. Short signature and universal designated verifier signature without random oracles [C]// Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS' 05). New York: Springer-Verlag, 2005: 483- 498.

共引文献1

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部