期刊文献+

对一个改进的指定验证者代理签名方案的攻击

An attack to an improved designated verifier proxy signature scheme
下载PDF
导出
摘要 对一个改进指定验证者的代理签名方案进行了分析,指出了其中的安全漏洞.系统中的一个用户如果截取到原始签名人发送给代理签名人的信息,则可以伪造对消息的代理签名.该攻击方案可以成功的原因是在原签名方案的验证中仅使用了指定验证者的公私钥,没有其他的公钥信息.该攻击方案虽然短小,但对原始签名方案是有效的. An improved designated verifier proxy signature scheme is analysed and a security loophole is proposed. If any user in the system intercepts the authorization information which is sent to the proxy signer from the orininal signer, he can forge a valid signature for others message. There is no any other public information, besides the desinated verifier's private key in ver fication step, which is the reason why there exists such a forgery attack. Although that forgery attack is small , it is valid to the signature scheme.
出处 《山东理工大学学报(自然科学版)》 CAS 2010年第6期26-28,共3页 Journal of Shandong University of Technology:Natural Science Edition
基金 国家自然科学基金资助项目(90718011) 山东科技大学研究生科技创新基金资助项目(YCA100339)
关键词 基于身份的签名 指定验证者签名 代理签名 双线性对 identity-based signature designated verifier signature proxy signature bilinear parings
  • 相关文献

参考文献10

  • 1康明.壳型/芯覆膜砂用热塑性酚醛树脂状况的研究[J].汽车科技,1996(1):30-33. 被引量:2
  • 2Chaum D, Antwerpen H V. Undeniable signatures[C]//Proc. of Cryptology-Crypto'89. Springer-Verlag, 1989: 212-216.
  • 3易继锴,王素芝,石福强,徐锦程.酚醛树脂聚合反应过程的模糊控制[J].北京工业大学学报,1991,17(4):42-47. 被引量:3
  • 4Saeednia S, Kramer S, Markovitch O. An efficient strong desig- nated verifier signature scheme [C]// The 6th International Conference on Information Security and Cryptology (IClSC2003), Berlin:Springer , 2003:40-54.
  • 5Berlan J. Microwaves in chemistry: Another way of heating reaction mixtures [J]. Radiate Phys. Chem., 1995, 45 (4): 581-589
  • 6Wang G. Designated-verifier proxy signatuer for e-commerce [C]//Proceedings of IEEE International Conference on Multi- media and Expo, Taibei, Taiwan , 2004, 3:1731-1734.
  • 7Lal S,Verma V. Identity based strong designated verifier proxy signature schemes [ EB/OL]. Cryp. eprint Archive Report 2006/394. Availiable at http://eprint, iacr. org/2006/394, pdf.
  • 8Kumar K, Shailaja G, Saxena A. Identity based strong desig-nated verifier signatuers scheme[EB/OL]. Cryp. eprint ArchiveReport 2006/134. Availiable at http://eprint, iacr. org/2006/134. pdf.
  • 9Kang B, Boyd C, Dawson E. Identity-based strong designatedverifier signature scheme: Attack and new construction[J].Computes and Electrical Engineering , 2009, 35(1): 49-53.
  • 10Huang X, Susilo W,Mu Y. Short designated verifier signaturescheme and its identity-based variant[J]. International Journalof Network Security , 2008 , 6(1): 82-93.

二级参考文献1

  • 1李宝绶,刘志俊.用模糊集合理论设计一类控制器[J]自动化学报,1980(01).

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部