期刊文献+

基于身份前向安全的代理签名方案的安全性分析 被引量:4

Cryptanalysis of ID-based forward secure proxy signature scheme
下载PDF
导出
摘要 对一种基于身份前向安全的代理签名方案(Z-Z方案)进行了密码学分析,指出该方案容易遭受移动线性攻击,不具有前向安全性和不可伪造性,并且代理密钥泄漏后攻击者可以伪造未来时段的代理签名.提出了一种改进方案,新方案克服了Z-Z方案的安全漏洞,可以有效抵抗移动线性攻击,并且具有前向安全性和后向安全性:即使代理密钥被泄露,攻击者也无法伪造过去和未来时段的代理签名. Analyzed an ID-based forward secure proxy signature scheme,it is pointed out that the scheme can not resist mobile linear attack so that it is neither unforgeable nor forward secure,and the malicious attacker can forge proxy signature in the future periods after he intruded the system at certain period.An improved scheme is proposed,it overcomes the security drawbacks and can resist mobile linear attack effectively.Besides it holds forward secure and backward secure simultaneously.
出处 《西北师范大学学报(自然科学版)》 CAS 北大核心 2012年第1期44-47,51,共5页 Journal of Northwest Normal University(Natural Science)
基金 河北省教育厅自然科学研究项目(Z2011155) 河北师范大学科研基金资助项目(L2010Q15)
关键词 代理签名 前向安全 基于身份 移动线性攻击 后向安全 proxy signature forward secure ID-based mobile linear attack backward secure
  • 相关文献

参考文献5

二级参考文献41

共引文献21

同被引文献42

  • 1张波,徐秋亮.一个强前向安全的代理签名方案[J].计算机工程与应用,2006,42(9):109-110. 被引量:9
  • 2杨波.现代密码学[M].北京:清华大学出版社,2007.
  • 3Chaum D.Blind signatures for untraceable payment [C] //Advances inCryptology-Crypto1 82.New York:Plenum Press,1983:199-203.
  • 4Lin W D,Jan J K.A security personal learning tools using a proxy blindsignature scheme [C] //Proc of International Conference on ChineseLanguage Computing.USA:Chinese Language Computer SocietyKnowledge Systems Institute,2000:273-277.
  • 5Anderson R.Two remark on public key cryptology [C] //Proceedings ofthe 4th ACM Computer and Communication Security.Zurich,Switzer-land,1997:1-7.
  • 6Anderson R. Two Remarks on Public Key Cryptology[C]// Proceedings of the 4th ACM Conference on Computer and Communication Security. Zurich, Switzerland: ACM Press, 1997: 16-30.
  • 7Fiat A, Shamir A. How to Prove Yourself: Practical Solutions to Identification and Signature Problems[C]//Proceedings of Crytology-Crypto'86. Santa Barbara, USA: Springer-Verlag, 1987: 186-194.
  • 8Bellare M, Miner S K. A Forward-secure Digital Signature Scheme[C]//Proceedings of CRYPTO'99. Berlin, Germany: Springer-Verlag, 1999:431-448.
  • 9Michel A, Leonid R. A New Forward-secure Digital Signature Scheme[C]//Proceedings of Cryptology-Asiacrypt'00. Kyoto, Japan: Springer-Verlag, 2000:116-129.
  • 10Burmester M, Chrissikopoulos V, Kotzanikolaou P, et al. Strong Forward Security[C]//Proceedings of the 16th International Conference on Information Security. Paris, France: Kluwer Academics Publishers, 2001: 109-119.

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部