期刊文献+

对一类基于身份的门限代理签名方案的伪造攻击 被引量:3

Forgery Attacks on a Series of ID-based Threshold Proxy Signature Schemes
下载PDF
导出
摘要 近来,于义科等人提出了一系列标准模型下基于身份的门限代理签名方案,并以其中最新的于-郑方案作为攻击目标,设计了3个有效的伪造攻击算法。利用这些算法,攻击者可以在得不到原始签名人和任何代理签名人私钥的情况下,仅通过选取随机参数以及多项式时间内的计算,就可达到以显著的成功概率伪造普通签名或任意代理签名人的部分签名的目的。这些伪造攻击算法对于-郑方案及与其同类的其他几个方案都具有有效性。攻击显示,此类基于身份的门限代理签名方案是不安全的。最后分析了方案遭受攻击的原因,并给出了两种可能的改进措施。 Recently, YU Y K et al. proposed a series of ID-based threshold proxy signature in the standard model. This paper constructed three attack algorithms for the latest scheme of YU-ZHENG, with which attacker can forge valid both regular signature on behalf of the original signer and proxy signature of any proxy signer on any message without knowing the signing key of these signers. Our attacking algorithms work well with scheme of YU-ZHENG and the decedent schemes. Attacks show that this series of schemes are unsecure. We analyzed the root cause of attacks and gave some suggestions for modifications in the end.
出处 《计算机科学》 CSCD 北大核心 2012年第10期73-77,共5页 Computer Science
基金 国家自然科学基金资助项目(61100221) 中央高校基本科研业务费专项资金(2011QN044)资助
关键词 基于身份签名 门限代理签名 伪造攻击 双线性映射 Identity based signature, Threshold proxy signature, Forge attack, Bilinear map
  • 相关文献

参考文献11

二级参考文献41

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:99
  • 2徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 3蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 4顾纯祥,祝跃飞,潘晓豫.Forking引理与一类基于身份签名体制的安全性证明(英文)[J].软件学报,2007,18(4):1007-1014. 被引量:4
  • 5Shamir A. Identity-based cryptosystems and signature schemes [C]//Proceedings of Crypto 1984. New York: Springer-Verlag, 1984:47-53.
  • 6Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of Crypto 2001. LNCS 2139. London: Springer-Verlag, 2001 :213-229.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security. New York: ACM, 1996:48-57.
  • 8Kim S, Park S, Won D. Proxy Signatures, Revisited[C]//Pro- ceedings of Information and Communications Security (ICI- CS97). LNCS 1334. Springer-Verlag, 1997:223-232.
  • 9Zhang F, Kim K. Eficient ID-based blind signature and proxy signature from bilinear pairings[C]//Proceedings of the 8th Australasian Conference on Information Security and Privacy. Berlin/Heidelberg: Springer-Verlag, 2003 : 312-323.
  • 10Xu J, Zhang Z, Feng D. ID-based proxy signature using bi-linear pairings[C]//Proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications. Berlin/Heidelberg: Springer-Verlag, 2005 : 359-367.

共引文献32

同被引文献39

  • 1谭作文,刘卓军,陈伟东.存在特权集的代理门限群签名方案[J].计算机工程与应用,2004,40(25):31-34. 被引量:6
  • 2蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 3Mambo M, Usuda K, Okamoto E.Proxy signature for dele-gating signing operation[C]//3rd ACM Conference on Com-puter and Communications Security, New York,USA,1996:48-57.
  • 4Zhang K.Threshold proxy signature schemes[C]//lst Interna-tional Workshop on Information Security, London, UK, 1997 :282-290.
  • 5Kim S,Park S,Won D.Proxy signatures,revisited[C]//lst Inter-national Conference on Information and CommunicationSecurity,London,UK,1997: 223-232.
  • 6Hwang M S,Lu E J L, Lin I C.A practical (., n) thresholdproxy signature scheme based on the RSA cryptosystemfj].IEEE Transactions on Knowledge and Data Engineering,2003,15(6):1552-1560.
  • 7Hong X.Efficient threshold proxy signature protocol for mobileagents[J].Information Sciences,2009,179(24) :4243-4248.
  • 8Shamir A.Identity-based cryptosystems and signature schemes[C]//Proceedings of Crypto.New York:Springer-Verlag, 1984:47-53.
  • 9Boneh D, Franklin M.Generalized identity based and broadcastencyption schemes[C]//LNCS 5350:Advances in Cryptology-ASIACRYPT2008.Berlin : Springer-Verlag,2008 : 455-470.
  • 10Bao H Y, Cao Z F, Wang S B.Identity-based threshold proxysignature scheme with known signers[C]//Proceedings ofTheory and Applications of Models of Computation, Berlin,Germany,2006 : 538-546.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部