期刊文献+

签密方案的密文滥用性分析 被引量:2

Resistance to Misuse Ciphertext of Signcryption Scheme
下载PDF
导出
摘要 对签密密文的滥用是指恶意的接收者利用收到的密文伪造新的密文,使之具有不同的接收者,现有EUF-CMA(Existential UnForgeability against adaptive Chosen Messages Attack)模型不能有效模拟签密方案的密文滥用性,一些签密方案也不能抵抗对密文的滥用攻击。该文通过对EUF-CMA模型中敌手的能力进行增强,实现了模拟签密密文滥用攻击。以新近提出的几种异构签密方案为例,描述方案中存在的针对签密密文滥用的攻击实例,分析形成攻击的原因,并提出相应的改进方法。最后,以其中一种改进方案作为实例,演示采用增强的EUF-CMA模型分析签密方案密文滥用性的过程,表明该文中针对EUF-CMA模型的增强,以及对签密方案的改进方法是合理和有效的。 The misuse of signcryption ciphertext means that the malicious recipient uses the received signcryption ciphertext to forge a new ciphertext that has a different recipient.It is found that the Existential UnForgeability against adaptive Chosen Message Attack(EUF-CMA)model can not simulate misuse attacks on signcryption schemes,and many of the existing signcryption schemes,claimed provable secure,can not resist the misuse attack.By enhancing the capabilities of adversaries in the EUF-CMA model,an extended EUFCMA model is defined which captures the security associated with the resistance to misuse attacks on signcryption schemes.This paper describes the misuse attack instances in several newly proposed heterogeneous signcryption schemes,analyzes the reasons for the attacks and proposes improvement approaches.Finally,using the enhanced EUF-CMA model,the unforgeability of an improved heterogeneous signcryption scheme is analyzed,and the procedure of simulating the misuse attack is demonstrated.The results indicate that the enhanced EUF-CMA model and the improvement approaches for signcryption schemes are reasonable and effective.
作者 陈明 王霏 CHEN Ming;WANG Fei(School of Mathematics and Computer Science,Yichun University,Yichun 336000,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2019年第4期1010-1016,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61662083) 江西省教育厅科学技术研究项目(GJJ151040 GJJ161042 GJJ161677)~~
关键词 签密 机密性 不可伪造性 密文滥用性 EUF-CMA模型 Signcryption Confidentiality Unforgeability Ciphertext misuse Existential UnForgeability against adaptive Chosen Message Attack(EUF-CMA)model
  • 相关文献

参考文献8

二级参考文献30

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption) cost (signature) + cost ( en- cryption) [ A ]. Advances in the Cryptology-CRYPTO [C ]. California: Springer, 1997. 165 - 179.
  • 4Huang Q, Wong D S, Yang G M. Heterogeneous signcryp- tion with key privacy [J ]. The Computer Journal, 2011,54 (4) :525 -536.
  • 5Fu X T, Li X W, Liu W. IDPKC-to-TPKI construction of multi-receiver signcryption [ A]. Proceedings of the INCoS (5) [ C]. Xian :IEEE,2013. 335 -339.
  • 6Li F G, Zhang H, Takagi T. Efficient signcryption for heter- ogeneous systems[ J ]. IEEE Systems Journal, 2013,7 ( 3 ) : 420 - 429.
  • 7Shamir A. Identity-based cryptosystems and signature schemes [A ]. Advances in Cryptology [ C ]. Heidelberg: Springer, 1985.47 - 53.
  • 8Libert B, Quisquater J. Efficient signcryption with key pri- vacy from gap Diffie-Hellman groups E A 1. Advances in Public Key Cryptography-PKC [ C ]. Berlin, Springer, 2004. 187 - 200.
  • 9Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing [ A ]. Advances in Cryptology-Asiacrypt [ C ]. Berlin: Springer, 2001.514 - 532.
  • 10Yang G M,Wong D S, Deng X T. Analysis and improve- ment of a signcryption scheme with key privacy [ A ]. Ad- vances in Public Key Cryptography-PKC [ C ]. Berlin,Springer ,2005,218 - 232.

共引文献41

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部