期刊文献+

无证书有序多重签名方案的安全性分析

Security Analysis of a Certificateless Sequential Multi-signature Scheme
下载PDF
导出
摘要 为了提高分布式环境下信任链上推荐信息的认证效率,秦艳琳等人提出一个高效的有固定签名长度的无证书有序多重签名方案,并证明了她们的方案是安全的.但是,秦方案的设计存在安全缺陷,通过具体攻击方法进行分析,结果显示,任意一个敌手都可以篡改其信任路径上的信息,可以伪造所有节点对信息的多重签名. In order to improve the authentication efficiency of information transmitted through trust train,QinYanlin proposed a certificateless sequential multi-signature scheme with constant signature length,and proved thattheir scheme is secure. This article points out that Qin's scheme has serious security flaws. By giving specificattacks,an adversary can tamper with any information on the trust path,and can forge all node multi-signatures.
作者 杜红珍
出处 《河南科学》 2014年第12期2514-2516,共3页 Henan Science
基金 国家自然科学基金项目(61402015) 宝鸡文理学院基金项目(ZK12042)
关键词 无证书公钥密码 有序多重签名 双线性对 certificateless public key cryptography sequential multi-signature bilinear pairing
  • 相关文献

参考文献8

二级参考文献57

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2ITAKURA K, NAKAMURA K. A public-key cryptosystem suitable for digital multisignatures [ R]. NEC Research & Development, 1983,71:1 -8.
  • 3LU S, OSTROUSKY R, SAHAIA A, et al. Sequential aggregate signatures and multisignatures without random oracles [ EB/OL]. [ 2008 - 10 - 10]. http://eprint. iacr. org/2006/096.pdf.
  • 4AL-RIYAMI S, PATERSON K G. Certificateless public key cryptography [ C]// Proceedings of ASIACR YFF03. Berlin: Springer- Verlag, 2003: 452 - 473.
  • 5ZHANG Z-F, WONG DC S, XU J, et al. Certificateless public-key signature: Security model and efficient construction [ C ]// ACNS'06: Proceedings of 4th International Conference on Applied Cryptography and Network Security. Berlin: Springer-Verlag, 2006: 293 - 308.
  • 6STEINFELD R, BULL L, WANG H, et al. Universal designated- verifier signatures [ C]// Proceedings of ASIACRYPT'03. Berlin: Springer-Verlag, 2003:523-542.
  • 7SEO S H, HWANG J Y, CHOI K Y, et al. Identity-based u-niversal designated multi-verifiers signature schemes [ J]. Computer Standards & Interfaces, 2008, 30(5) : 288 -295.
  • 8POINTCHEVAL D, STEM J. Security proofs for signature schemes [ EB/OL]. [2008 - 10 - 10]. http://dsns.csie. nctu. edu. tw/research/erypto/HTML/PDF/E96/387. PDF.
  • 9Itakura K, Nakamura K. A Public-key Cryptosystem SuitabLe tor Digital Multisignatures[J]. NEC Research & Development, 1983, (71): 1-8.
  • 10Zhang Lei, Zhang Futai. A New Certificateless Aggregation Signature Shceme[J]. Computer Communications, 2009, 32(6): 1079-1085.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部