期刊文献+

对Wu-Wang盲签名方案的攻击与改进 被引量:2

Attack for Wu-Wang blind signature scheme and its improvement
下载PDF
导出
摘要 分析了Wu-Wang提出的基于离散对数问题的盲签名方案的安全性,给出了一个攻击,即签名请求者仅执行一次方案可以同时得到两则不同消息的有效签名。针对该攻击提出一种改进方案,通过在签名阶段引入一个随机数来抵抗此种攻击,使得方案安全性能提高。 The security of blind signature scheme based on the discrete logarithm problem which is proposed by Wu-Wang is analyzed, and a security attack is given, that is, a signature requester can obtain valid signatures of two different messages at the same time through performing only one round of the protocol. A modified scheme is presented, in the signature phrase a random number is used by a s!gner to prevent this kind of attack, and its security is improved.
出处 《计算机工程与应用》 CSCD 2012年第4期77-78,82,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(No.10571113) 陕西省自然科学基金计划研究项目(No.2009JM8002) 陕西省教育厅科学研究计划(自然科学项目No.2010JK829)
关键词 盲签名 不可链接性 安全性 攻击方案 blind signature unlinkability security attack scheme
  • 相关文献

参考文献9

  • 1Chaum D.Blind signatures for untraceable payments[C]//Proceed-ings of Eurocrypt' 82.Burg Feuerstein, Germany: Plenum Press, 1983 : 199-203.
  • 2Carnenisch J, Piveteau J, Stadler M.Blind signatures based on the discrete logarithm problem[C]//Advances in Cryptology- EUROCRYPT' 94, Perugia, Italy, 1994: 428-432.
  • 3Ham L.Cryptanalysis of the blind signatures based on the dis- crete logarithm problem[J].Electronics Letters, 1995,31 (14) : 1136-1137.
  • 4Horster P, Michels M, Petersen H.Comment: cryptanalysis of the blind signatures based on the discrete logarithm problem[J].Elec- tronics Letters, 1995,31 (21 ).
  • 5Lee C C, Hwang M S, Yang W P.A new blind signature based on the discrete logarithm problem for untraceability[J].Applied Mathematics and Computation, 2005,164 (3) : 837-841.
  • 6Wu T,Wang J R.Comment:a new blind signature based on the discrete logarithm problem for untraceability[J].Applied Mathe- matics and Computation, 2005,170(2) : 999-1005.
  • 7Fan C I,Guan D J,Wang C I,et al.Cryptanalysis of Lee-Hwang- Yang blind signature scheme[J].Applied Computer Standards & Interfaces, 2009,31 : 319-320.
  • 8张建中,王洁,刘勤喜.新的代理盲签名方案及其在电子现金中的应用[J].计算机应用研究,2009,26(1):347-349. 被引量:10
  • 9柳菊霞,苏靖枫.基于离散对数的代理盲签名方案[J].计算机工程与应用,2010,46(25):94-96. 被引量:7

二级参考文献22

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2XU Zhong DAI Guanzhong YANG Deming.An Efficient ECDSA-Based Signature Scheme for Wireless Networks[J].Wuhan University Journal of Natural Sciences,2006,11(6):1707-1710. 被引量:4
  • 3王天银,蔡晓秋,张建中.一种安全有效的代理盲签名方案[J].计算机工程,2007,33(2):148-149. 被引量:6
  • 4王天银,蔡晓秋,张建中.基于双线性对的新型代理盲签名方案[J].计算机应用研究,2007,24(2):130-131. 被引量:3
  • 5CHAUM D. Blind signatures for untraceable payments [ C ]//Proc of Advances in Cryptology Crypto. New York: Springer-Verlag, 1982: 199-203.
  • 6CHAUM D, FIAT A, NAOR M. Untraceable electronic cash LNCS 403 [ C ]//Proc of Crypto' 88. New York : Springer-Verlag, 1998 : 319- 327.
  • 7ABE M, FUJISAKI E. How to date blind signatures [ C ]//Proc of Advances in Cryptology- AISACRYPT' 96. Berlin: Springer- Verlag, 1996:244 - 251.
  • 8MAMBO M, USUDA K, OKMAMOTO E. Proxy signatures delegation of the power to sign message[ J]. IEICE Trans on Functional, 1996, E79-A(9) :1338-1354.
  • 9MAMBO M, USUDA K, OKMAMOTO E. Proxy signatures for delegating signing operation[ C]//Proc of the 3rd ACM Conference on Computer and Communications Security. New York: ACM Press, 1996:48- 57.
  • 10KIM S, PARK S, WON D. Proxy signatures, revisited [ C ]//Proc of Information and Communications Security. London: Springer-Verlag, 1997:223-232.

共引文献15

同被引文献16

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部