期刊文献+

两个前向安全盲签名体制的安全性分析 被引量:3

Security analysis of two forward-secure blind signature schemes
下载PDF
导出
摘要 前向安全盲签名能提供重要的安全保证,即使已经完全暴露了当前密钥,也能够形成在入侵之前的秘密密钥和电子签名的安全保护.针对最近由Hui-Feng Huang与Chin-Chen Chang,以及Yali Liu,Xinchun Yin与Juewei Chen分别提出的新的前向安全盲签名方案进行了安全性分析,通过密钥结构分析和困难问题分析成功攻破了该方案,证明了这些方案实际上都不具备前向安全性. Forward-secure blind signature schemes can provide important security guarantees: all secret keys and digital signatures before current key exposure will still be secure. We make a Security analysis of the recent two new forward-secure blind signature schemes respectively proposed by Hui-Feng Huang et al and Yali Liu et al. These schemes are totally broken by cryptanalysis on the key structure or hardness problem. It is proved that they are not forward-secure.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2010年第1期107-112,147,共7页 Journal of Xidian University
基金 国家自然科学基金资助项目(60773121)
关键词 密码学 数据安全 盲签名 前向安全性 密钥暴露 cryptography security of data blind signature forward security key exposure
  • 相关文献

参考文献10

  • 1Chaum D. Blind Signatures for Untraceable Payments[C]//Proc of CRYPTO'82. New York: Plenum Press, 1982" 199- 203.
  • 2Duc D N, Cheon J H, Kim K. A Forward-secure Blind Signature Scheme Based on the Strong RSA Assumption[C]// Proc of ICICS 2003: LNCS Vol 2836. New York: Springer-Verlag, 2003: 11-21.
  • 3Wang Shuhong, Bao Feng, Deng R H. Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security [C]//Proc of ICICS 2005: LNCS Vol. 3783. Berlin: Springer-Verlag, 2005: 53-60.
  • 4Lai Y P, Chang C C. A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures[C]// Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05). Washington, DC: IEEE CS, 2005: 139-144.
  • 5Chow S S M, Hui L C K, Yiu S M, et al. Forward-secure Multisignature and Blind Signature Schemes[J]. Applied Mathematics and Computation, 2005, 168(2) : 895-908.
  • 6蔡静娴.基于质因数分解难题的前向式安全盲签章系统[D].中坜:国立中央大学,2006.
  • 7Huang H F, Chang C C. A New Forward-Secure Blind Signature Scheme[J]. Journal of Engineering and Applied Sciences, 2007, 2(1): 230-235.
  • 8Liu Yali, Yin Xinchun, Chen Juewei. A Forward Secure Blind Signature Scheme[C]//Proc of 2008 Congress on Image and Signal Processing: Vol 3. Washington: IEEE CS, 2008: 7-11.
  • 9Bellare M, Miner S. A Forward-secure Digital Signature Scheme [C] //Proc of CRYPTO'99: LNCS Vol 1666. Berlin: Springer-Verlag, 1999: 431-448.
  • 10Mao W. Modern Cryptography: Theory and Practice[M]. 1st ed. New Jersey: Prentice Hall, 2004.

同被引文献50

  • 1Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-field Communication [M]. 3nd Edition. London: John Wiley & Sons, 2010.
  • 2Habibi M H, Gardeshi M, Alaghband M R. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C- 1 G-2 Standard [J].International Journal of UbiComp(IJU), 2011, 2(1) :1-13.
  • 3Lee Y, Batina L, Singel'ee D. Low-cost Untraceable Authentication Protocols for RFID [C]//Proe of the 3rd ACM Conference on Wireless Network Security (WiSec2010). New York: Hoboken, 2010: 55-64.
  • 4Spiekermann S, Evdokimov S. Critical RFID Privacy-enhancing Technologies [J].IEEE Security and Privacy, 2009, 7 (2) : 56-62.
  • 5Yauksel K. Universal Hashing for Ultra-low-power Cryptographic Hardware Applications [D]. Worcaster: Department of Electroninal Engineering, Worcester Polytechnic Institute, 2004.
  • 6Due D, Park J, Lee H, et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning [C]// Proe of The 2006 Symposiumon on Cryptography and Information Security. Hiroshima: Institute of Electronies, Information and Communication Engineers, 2006: 17-20.
  • 7Chien H, Chen C. Mutual Authentication Protocol for RFID Conforming to EPC Class1 Generation 2 Standards [J]. Computer Standards& Interfaces, 2007, 29(2): 254-259.
  • 8Lim C, Kwon T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer [C]//Proc of International Conference on Information and Communications Security. Berlin: Springer-Verlag, LNCS 4307, 2006: 1- 20.
  • 9Cho J S, Yeo S S, Kim S K. Securing against Brute-force Attack: a hash-based RFID Mutual Authentication Protocol Using a Secret Value [J]. Computer Communications, 2011, 34(3) : 391-397.
  • 10Phan R C W, Wu J, Ouafi K, et al. Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes [J]. Wireless Personal Communications, 2010, 53(2): 1-13.

引证文献3

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部