期刊文献+

数字签名方案的同底构造攻击 被引量:2

Identical base construction attack on digital signature scheme
下载PDF
导出
摘要 在数字签名中,由于签名因子或整个签名方案设计的不合理,使得攻击者很容易通过将签名验证等式进行变形,将其转换成一个同底的等式,并通过指数的相等伪造出签名数据。针对此问题,提出同底构造攻击的概念,并明确指出,在进行数字签名设计时,必须回避这种现象。通过实例说明了这些例子中签名协议设计的不安全性,并给出一些通用方法说明如何对这些签名方案进行改进。 This paper studied many digital signature schemes and had found them insecure because of the irrationality of these signature factors or the whole signature scheme,which made the attackers be able to transform the signature verification equation into a equation with the same base number and easily forge signature datum through the equation of the two exponents.The paper proposed a new concept:the attack based on identical base construction,and explicitly indicated that defects could be avoided in designing digital signature.Meanwhile,four examples were given to illustrate the insecurity in signature designing.Finally,some general ways to improve these signature schemes were provided
出处 《计算机应用》 CSCD 北大核心 2010年第4期1042-1044,共3页 journal of Computer Applications
关键词 同底构造 代理签名 群签名 盲签名 公钥 identical base construction proxy signature group signature blind signature public key
  • 相关文献

参考文献10

  • 1DIFFIE W,HELLMAN M E.New directions in cryptography[EB/OL].[2009-06-20].http://www.cs.jhu.edu/-rubin/courses/sp03/papers/diffie.hellman.pdf.
  • 2曹正军,刘木兰.数字签名方案中的孤悬因子和冗余数据[J].计算机学报,2006,29(2):249-255. 被引量:15
  • 3MAMBO M,USUDA K,OKAMOTO E.Proxy signature:Delegation of the power to sign messages[J].IEICE Transactions of Fundamentals,1996,E79-A(9):1338-1354.
  • 4CHAUM D.Blind signature for untraceable payments[C]// Proceedings of Crypto' 82.New York:Springer-Verlag,1983:199-203.
  • 5TAN ZUOWEN,LIN ZHOUJUN,TANG CHUNMING.Digital proxy blind signature schemes based on DLP and ECDLP[EB/OL].[2009-06-20].http://www.mmrc.iss.ac.cn/pub/ram21.pdf/tan.pdf.
  • 6AWASTHI A K,SUNDER L.Proxy blind signature scheme[J].Transactians on Cryptolagy,2005,2(1):5-11.
  • 7DUC N D,CHEON H I,KIM K.A forward-secure blind signature scheme based on the strong RSA assumption[C]//The 9th Annual International Workshop on Selected Areas in Cryptography.Berlin:Spfingnr-Verlag,2003:11-21.
  • 8CHAUM D,HEYST E.Group signatures[C]// Advances in Cryptology-EuroCrypt'91.Berlin:Springnr-Verlag,1992:257-265.
  • 9TSENG Y M,JAN J K.Reply improved group signature scheme based on the discrete logarithm problem[J].Electronics Letters,1999,35(16):1324-1325.
  • 10XUE QING-SHUI,CAO ZHEN-FU.A new proxy blind signature scheme with warrant[C]// Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems.New York:IEEE,2004:1386-1391.

二级参考文献4

共引文献14

同被引文献13

  • 1DIFFIE W,HELLMAN M E.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.
  • 2HARN L, REN JIAN, LIN CHANGLU. Design of DL-based certificateless digital signatures[J]. The Journal of Systems and Software,2009,82(5):789-793.
  • 3MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,E79-A(9):1338-1354.
  • 4TAN ZUOWEN, LIN ZHOUJUN, TANG CHUNMING. Digital proxy blind signature schemes based on DLP and ECDLP[J]. MM Research Preprints,2002,21(7):212-217.
  • 5AWASTHI A K, SUNDER L. Proxy blind signature scheme[J]. Transactions on Cryptology, 2005, 2(1): 5-11.
  • 6SUN H M, HSIEH B T. On the security of some proxy blind signature schemes[EB/OL]. [2010-08-20]. http://eprint.iacr.org.
  • 7WANG SHAOBIN,HONG FAN,CUI GUOHUA. Secure efficient proxy blind signature schemes based DLP[C] // Proceedings of the Seventh IEEE International Conferenceon E-Commerce Technology. New York: IEEE,2005:452-455.
  • 8AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // Cryptology-Asiacrypt 2003,LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473.
  • 9CASTRO R, DAHAB R. Two notes on the security of certificateless signatures[C] // Proceedings of the 1st International Conference on Provable Security, LNCS 4784. Berlin: Springer-Verlag, 2007: 85-102.
  • 10HUANG XINYI, MU YI, SUSILO W, et al.Certificateless signature revisited[C] // Proceedings of the 12th Australasian Conference on Information Security and Privacy, LNCS 4586.Berlin: Springer-Verlag, 2007: 308-32.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部