期刊文献+

对两类基于双线性对的签名方案的攻击

Attacks on two signature schemes based on bilinear pairings
下载PDF
导出
摘要 Wen和Ma提出了一个基于传统PKI体制上的聚合签名方案,并认为该方案在随机预言机模型下是可证明安全的。但本文指出Wen-Ma方案是可以普遍伪造的,敌手既可以伪造某一个签名人的(普通)数字签名又可以伪造多个签名人的聚合签名。另外,Dai等人提出了一个适用于移动商务的基于身份的数字签名方案,但杜红珍发现该方案是不安全的,并给出了该方案的两种伪造攻击。 Wen and Ma presented an aggregate signature scheme in the public key infrastructure setting and claimed their scheme is provably secure in the random oracle model. But this paper pointed out Wen-Ma scheme was universally forgeable, and an adversary could forge not only any signer’s ordinary signatures but also aggregate signatures produced by many different signers. In addition, Dai et al. proposed an identity-based sinature scheme. DU Hong-zhen found out their scheme was insecure and gave two forgery attacks on the scheme.
作者 杜红珍
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1879-1881,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60873191) 宝鸡文理学院重点科研项目(ZK0952)
关键词 聚合签名 基于身份的数字签名 随机预言机模型 双线性映射 aggregate signature identity-based signature random oracle model bilinear maps
  • 相关文献

参考文献16

  • 1BONEH D,GENTRY C,LYNN B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proc of Advances in Cryptology-Eurocrypt.Berlin:Springer-Verlag,2003:416-432.
  • 2XU Jing,ZHANG Zhen-feng,FENG Deng-guo.ID-based aggregate signatures from bilinear pairings[C]// Proc of CANS.Berlin:Springer-Verlag,2005:110-119.
  • 3GENTRY C,RAMZAN Z.Identity-based aggregate signatures[C]// Proc of PKC.Berlin:Springer,2006:257-273.
  • 4SONG J,KIM H,LEE S,et al.Security enhancement in Ad hoc network with ID-based cryptosystem[C]// Proc of ICACT.Berlin:Springer-Verleg,2005:372-376.
  • 5BELLARE M,NAMPREMPRE C,NEVEN G.Unrestricted aggregate signatures[C]// Proc of ICALP.Berlin:Springer-Verlag,2007:411-422.
  • 6LI J,KIM K,ZHANG Fang-guo,et al.Aggregate proxy signature and verifiably encrypted proxy signature[C]// Proc of Prov Sec.Berlin:Springer-Verlag,2007:208-217.
  • 7CHENG X,LIU J,WANG X.Identity-based aggregate and verifiably encrypted signatures from bilinear pairing[C]// Proc of ICCSA.Berlin:Springer-Verlag,2005:1046-1054.
  • 8SHAMIR A.Identity-based cryptosystems and signature schemes[C]// Proc of Crypto'84.New York:Springer-Verlag,1985:47-53.
  • 9GUILLOU L,QUISQUATER J.A paradoxical identity-based signature scheme resulting from zero-knowledge[C]// Proc of Advances in Cryptology-CRYPTO'88,LNCS 403.Berlin:Springer-Verlag,1990:216-231.
  • 10CHA J,CHEON J.An identity-based signature from gap Diffie-Hellman groups[C]// Procof PKC.Berlin:Springer-Verlag,2003:18-30.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部