期刊文献+

新的基于双难题的带有消息恢复的签名方案 被引量:3

A New Signature Scheme with Message Recovery Based on Two Hard Problems
下载PDF
导出
摘要 为增强安全性,基于双难题的签名方案相继被提出,如基于离散对数和素因子分解问题的签名方案,其安全目标是只要一个难题未被攻破,方案就是安全.分析表明:如果因子分解问题可解,杨刚和李艳俊提出的基于双难题的方案(YL)将被攻破;如果离散对数问题可解,LI和CHEN的方案(LC)不能抵抗伪造攻击.文中提出一种新的签名方案,该方案是真正同时基于双难题的,并能将消息恢复.通过分析,与其它方案相比,更加高效. To enhance the security, many signature schemes were designed based on two hard problems, such as factoring and discrete logarithm. The major goal of these schemes is that they cannot he broken if both problems cannot be solved simultaneously. However, --. this paper shows that YL scheme can be broken if the factoring problem is solved, LC scheme is insecure against forgery if the discrete logarithm problem is solved. A new signature scheme is proposed that is really based on two hard problems simultaneously, which can also make the message recovered. Comparing with other schemes, this scheme is more efficient.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第9期175-178,共4页 Microelectronics & Computer
基金 信息安全国家重点实验室开放基金(02-04-4)
关键词 签名 因子分解 离散对数 二次剩余 伪造攻击 消息恢复 signature factorization discrete logarithms quadratic residue forgery attack message recovery
  • 相关文献

参考文献8

  • 1Mccurley Kevin S. A key distribution system equiva- lent to factoring[J]. Cryptology, 1988,1(2) : 95-105.
  • 2Harn L. Public-key cryptosystem design based on fac- toring and discrete logarithms[J]. IEE Proceedings- Computers and Digital Techniques, 1994, 141 ( 3 ): 193J195.
  • 3He J, Kiesler T. Enhancing the security of ElGamal's signature scheme[J]. IEE Proceedings-Computers and Digital Techniques, 1994, 141(4) :249-252.
  • 4杨刚,李艳俊.基于离散对数和因子分解的签名方案[J].北京理工大学学报,2004,24(4):324-326. 被引量:6
  • 5欧海文,叶顶锋,杨君辉,戴宗铎.关于同时基于因子分解与离散对数问题的签名体制[J].通信学报,2004,25(10):143-147. 被引量:7
  • 6李春辉,陈一宏.Enhancing the Security of He-Kiesler Signature Schemes[J].Journal of Beijing Institute of Technology,2003,12(3):326-328. 被引量:1
  • 7Nyberg K, Rueppel R A. Message recovery for signa- ture schemes based on the discrete logarithm[C]//Ad- vances in Cryptology, EUROCRYPT194 springer Vet- lay, 1994:175-190.
  • 8WANG Ching-te, LIN Chu-hsing, CHANG Chin- chen. Signature schemes based on two hard problems simultaneously[C]// Proceedings of the 17th Interna- tional Conference on Advanced Information Networ- king and Applications. [S. L] : IEEE, 2003 : 557-560.

二级参考文献22

  • 1Shao Z.Signature schemes based on factoring and discrete logarithms[J].IEEE Proc-Comput Digit Tech,1998(1):33-36.
  • 2Li J H, Xiao G Z.Remarks on new signature scheme based two hard problems[J].IEEE Letters, 1998(25):2401.
  • 3HARN L. Public-key cryptosystem design based on factoring and discrete Logarithms[J]. IEEE Proc Comput Digit Tech, 1994, 14l(3):193-195.
  • 4LEE N, HWANG T. Modified Harn signature scheme based on factoring and discrete logarithms[J]. IEEE Proc Comput Digit Tech, 1996, 143(3):196-198.
  • 5HARN L. Comment:Enhancing the security of Elgamal's signature scheme[J]. IEEE Proc Comput Digit Tech, 1995, 142(5):376.
  • 6TIERSMA H. Enhancing the security of Elgamal's signature scheme[J]. IEEE Proc Comput Digit Tech, 1997, 144(1):47-48.
  • 7SHAO Z. Signature schemes based on factoring and discrete logarithms[J]. IEEE Proc Comput Digit Tech, 1998, 145(1):33-36.
  • 8HE wh. Digital signature scheme based on factoring and discrete logarithms[J]. IEEE Electronics Letters, 200l, 37(4):220-222.
  • 9XIAO J, XIAO G. Remarks on new signatures scheme based on two hard problems[J]. E-LETTERS, 1998, 34(25):2401.
  • 10NYBERG K, RUPPEL R. A new signature scheme based on the DSA giving message recover[A]. 1st ACM Conference on Computer and Communication Security[C]. Fairfax, USA, 1993.

共引文献10

同被引文献30

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部