期刊文献+

Digital Signatures for e-Government - a Long-Term Security Architecture 被引量:1

Digital Signatures for e-Government - a Long-Term Security Architecture
下载PDF
导出
摘要 The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.
出处 《China Communications》 SCIE CSCD 2010年第6期64-70,共7页 中国通信(英文版)
关键词 MRSA PSS padding hash based signatures kleptography deterministic signatures 数字签名 安全体系结构 电子政府 确定性算法 安全隐患 合格证书 框架基础 标准格式
  • 相关文献

参考文献20

  • 1YOUNG A, YUNG M. The Dark Side of " Black-box" Cryptography, or: Should We Trust Cap Stone? [C]// Proceedings of CRYPTO 96. LNCS 1109. Berlin: Springer, 1996: 89-103.
  • 2YOUNG A, YUNG M, The Prevalence of Kleptographic Attacks on Discrete-log Based Cryptosystems [C]// Proceedings of CRYPTO97. LNCS 1294. Berlin: Springer, 1997: 264-276.
  • 3BONEH D, DING X, TSUDIK G, et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities [C]//Proceedings of the 10th conference on USENIX Security Symposium. Berkeley: USENIX, 2001 : 22-22.
  • 4TSUDIK G. Weak Forward Security in Mediated RSA[ J ]. LNCS 2576, 2002: 45-54.
  • 5BONEH D, DING X, TSUDIK G. Fine-grained Control of Security Capabilities [J]. ACM Trans. Internet Techn, 2004, 4(1): 60-82.
  • 6BELLARE M, SANDHU R. The Security of Practical Two-party RSA Signature Schemes [J]. http://eprint. iacr. org/ 2001/060.pdf.
  • 7COPPERSMITH D, CORON J S, GRIEU F, et al. Cryptanalysis of ISO/IEC 9796-1 [J]. Cryptology, 2008, 21 (1): 27-51.
  • 8CORON J S, NACCACHE D, TIBOUCHI M, et al. Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures [J/OL]. http:/eprint.iacr.org/2009/203.pdf.
  • 9RSA Laboratories: PKCS#1 v2. I -RSA Cryptography Standard + Errata. 2005.
  • 10JONSSON J. Security Proofs for the RSA-PSS Signature Scheme and Its Variants [J/OL]. http://eprint, iacr. org/ 2001/053 .pdf.

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部