期刊文献+

可证明安全数字签名方案的密码学分析 被引量:3

Cryptanalysis of provably digital secure signature schemes
下载PDF
导出
摘要 为了克服基于身份密码体制的密钥托管问题和基于无证书密码体制的公钥替换问题,研究者提出了基于证书密码体制的概念。针对李志敏等人提出的基于证书的签名方案提出分析,证明其不满足不可伪造性;针对黄茹芬等人提出的基于证书盲签名方案提出分析,结果表明它不能抵抗公钥替换攻击;对何俊杰提出的基于身份的部分盲签名方案提出分析,指出它不能抵抗窜改协商公共信息攻击。 In order to overcoming key-escrow problem of ID-based cryptosystem and public key replacing problem of certifi- careless cryptosystem, researcher proposed the definition of certificate-based cryptosystem. This paper analyzed the certificatebased signature scheme by Li Zhi-min et al. The result showed that it couldn't meet the safe requirement of unforgeability. It analyzed a certificate-based blind signature scheme by Huang Ru-fen et al. The result indicated that it was not security by replacing public key attack. It analyzed an ID-based partially blind signature scheme by He Jun-jie et al. The result indicated that it didn't resist the changing agreed information attack.
出处 《计算机应用研究》 CSCD 北大核心 2013年第12期3749-3752,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(11241005) 运城学院研究生科研启动项目(YPU-2010033)
关键词 基于身份的签名方案 基于证书的签名方案 部分盲签名方案 随机预言模型 公钥替换攻击 窜改协商公共信息攻击 ID-based signature scheme certificate-based signature scheme partially blind signature random oracle model public key replacement attack changing agreed public information attack
  • 相关文献

参考文献19

  • 1SHAMIR A.Identity-based cryptosystems and signature schemes[C]//Proc of CRYPTO,84.Berlin:Springer,1984:47-53.
  • 2GENTRY C.Certificate-based encryption and the certificate revoca-tion problem[C]//Lecture Notes in Computer Science,vol 2656.Berlin:Springer-Verlag,2003:272-293.
  • 3KANG B G,PARK J H,HAHN S G.A certificate-based signaturescheme[C]//Lecture Notes in Computer Science,vol 2964.Berlin:Springer-Verlag,2004:99-111.
  • 4WU Wei,MU Yi,SUSILO W,et al.Certificate-based signatures re-visited[J].Journal of Universal Computer Science,2009,15(8):1659-1684.
  • 5李继国,钱娜,黄欣沂,张亦辰.基于证书强指定验证者签名方案[J].计算机学报,2012,35(8):1579-1587. 被引量:16
  • 6李志敏,徐馨,李存华.高效的基于证书数字签名设计方案[J].计算机应用研究,2012,29(4):1430-1433. 被引量:6
  • 7CHAUM D.Blind signature for untraceable payments[C]//Proc ofAdvances in Cryptology-CRYPTO.Berlin ; Plenum Press,1983:199-233.
  • 8刘亚丽,殷新春,陈决伟.基于ELGAMAL前向安全的盲签名方案[J].通信学报,2007,28(8A):48-53.
  • 9邱钢,王宏,肖鸿,肖国镇.两个前向安全盲签名体制的安全性分析[J].西安电子科技大学学报,2010,37(1):107-112. 被引量:3
  • 10周萍,何大可.高效无可信PKG的新型盲签名方案[J].计算机应用研究,2012,29(2):626-629. 被引量:7

二级参考文献111

  • 1张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 2Chaum D. Blind Signatures for Untraceable Payments[C]//Proc of CRYPTO'82. New York: Plenum Press, 1982" 199- 203.
  • 3Duc D N, Cheon J H, Kim K. A Forward-secure Blind Signature Scheme Based on the Strong RSA Assumption[C]// Proc of ICICS 2003: LNCS Vol 2836. New York: Springer-Verlag, 2003: 11-21.
  • 4Wang Shuhong, Bao Feng, Deng R H. Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security [C]//Proc of ICICS 2005: LNCS Vol. 3783. Berlin: Springer-Verlag, 2005: 53-60.
  • 5Lai Y P, Chang C C. A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures[C]// Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05). Washington, DC: IEEE CS, 2005: 139-144.
  • 6Chow S S M, Hui L C K, Yiu S M, et al. Forward-secure Multisignature and Blind Signature Schemes[J]. Applied Mathematics and Computation, 2005, 168(2) : 895-908.
  • 7蔡静娴.基于质因数分解难题的前向式安全盲签章系统[D].中坜:国立中央大学,2006.
  • 8Huang H F, Chang C C. A New Forward-Secure Blind Signature Scheme[J]. Journal of Engineering and Applied Sciences, 2007, 2(1): 230-235.
  • 9Liu Yali, Yin Xinchun, Chen Juewei. A Forward Secure Blind Signature Scheme[C]//Proc of 2008 Congress on Image and Signal Processing: Vol 3. Washington: IEEE CS, 2008: 7-11.
  • 10Bellare M, Miner S. A Forward-secure Digital Signature Scheme [C] //Proc of CRYPTO'99: LNCS Vol 1666. Berlin: Springer-Verlag, 1999: 431-448.

共引文献52

同被引文献40

  • 1柴震川,董晓蕾,曹珍富.利用二次剩余构造的基于身份的数字签名方案[J].中国科学(F辑:信息科学),2009,39(2):199-204. 被引量:9
  • 2Anderson R. Two remarks on public-key cryptology [ C ]//Invited lec- ture : Proceedings of Fourth Annual Conference on Computer and Com- munication Security, New York : ACM Press, 1997.
  • 3Bellare M, Miner S. A forward-secure digital signature scheme [ C ]// 19th Annual International Cryptology Conference Santa Barbara, Cali- fornia, USA, August 15 - 19,1999.LNCS, Berlin : Springer, 1999.
  • 4Abdalla M, Reyzin L. A new forward-secure digital signature scheme [ C]//6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3 - 7, 2000, LNCS ,2000,1976 : 126 - 129.
  • 5Krawczyk H. Simple forward-secure signatures for any signature scheme [ C]//Proceedings of the 7th ACM Conferenee on Computer and Com- munications Security,2000 : 108 - 125.
  • 6Kang B G, Park J H, Hahn S G. A new forward secure signature scheme [ R]. Cryptology ePrint Archive ,2004.
  • 7Yu J,Kong F Y,Cheng X G,et al. Construction of yet another forward secure signature scheme using bilinear maps [ C ]//the second interna- tional conference on provable security, LNCS 5324, Springer-Verlag, Berlin,2008 : 83 - 97.
  • 8Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Proceedings of the 4th Annual International Cryptology Conference ( CRYPTO ' 84 ) , Santa Barbara, California, USA, LNCS, SpringerVer- lag, August 1985,196:47 - 53.
  • 9Galindo D, Garcia F D. A schnorr-like lightweight identity-based signa- ture scheme[ C]//Proc. of the 2nd International Conference on Cryp- tology in Africa ( AFRICACRYPT' 09 ), Gammarth, Tunisia, LNCS, Springer-Verlag, June 2009,5580 : 135 - 148.
  • 10Liu Y L, Yin X C, Qiu L. ID-based forward secure signature scheme from the bilinear pairings [ C ]//2008 International Symposium on Elec- tronic Commerce and Security, IEEE Computer Society, 2008 : 179 - 183.

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部