期刊文献+

安全高效基于身份签名方案的密码学分析 被引量:4

Cryptanalysis of a Secure and Efficient Identity-Based Signature Scheme
下载PDF
导出
摘要 基于身份的数字签名方案最显著的特点是,只需要签名人的身份信息而无需签名人的证书来验证签名的有效性,这极大地简化了密钥管理.2006年,Paterson和Schuldt构造了标准模型下可证明安全的基于身份的数字签名方案,但计算效率不高.谷科等人提出了新型的改进方案来提高效率,并声称新方案在标准模型下可证明安全且比同类方案更高效.然而,新方案并不具备不可伪造性.给出了两种具体的攻击:敌手可以伪造用户的密钥或者敌手可以直接伪造任何消息的签名.进一步指出安全性证明中的缺陷,即,敌手的view与安全模拟成功的事件不独立. The distinguishing characteristic of identity-based signatures is that only the identity with no certificate of a signer is involved in the verification of a signature, which simplifies the key management procedures dramatically. A novel identity-based signature scheme that can be proven secure in the standard model was given by Paterson and Schuldt in 2006. Unfortunately, the scheme is not efficient in computation. An improvement due to Gu, et al. was proposed recently to improve the computational efficiency, and it was claimed as being provably secure in the standard model and more efficient than the known schemes in the same flavor. However, this paper shows that the new scheme by Gu, et al. is insecure by demonstrating two concrete attacks in which an adversary can not only forge the private key of an identity but also forge signatures on arbitrary message. The study also identifies a flaw in their security proofs, i.e., the view of the adversary in the security reduction is not independent of the event that the simulation succeeds.
出处 《软件学报》 EI CSCD 北大核心 2014年第5期1125-1131,共7页 Journal of Software
基金 国家自然科学基金(61003232,61370203,61250110543) 教育部博士点基金(20100185120012)
关键词 数字签名 基于身份签名 标准模型 密码学分析 可证明安全 digital signature identity-based signature standard model cryptanalysis provable security
  • 相关文献

参考文献2

二级参考文献17

  • 1黄振杰,郝艳华,王育民,陈克非.一个高效的有向传递签名方案[J].电子学报,2005,33(8):1497-1501. 被引量:7
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4MICAILI S,RIVEST R L.Transitive signaure schemes[A].CT-RSA 2002(LNCS 2271)[C].Springer-Verlag,2002.236-243.
  • 5BELLARE M,NEVEN G.Transitive signatures based on factoring and RSA[A].ASIACRYPT 2002(LNCS 2501)[C].Springer-Verlag,2002.397-414.
  • 6BELLARE M,NEVEN G.Transitive signatures:new schemes and proofs[J].IEEE Transactions on Information Theory,2005,51(6):2133-2151.
  • 7SHAHANDASHTI S F,SALMASIZADEH M,MOHAJERI J.A provably secure short transitive signature scheme from bilinear group Pairs[A].SCN 2004(LNCS 3352)[C].Springer-Verlag,2005.60-76.
  • 8KUWAKADO H,TANAKA H.Transitive signature scheme for di-rected trees[J].IEICE Transactions on Fundamentals of Electronics,Com-munications and Computer Sciences,2003,E86-A(5):1120-1126.
  • 9YI X,TAN C H,OKAMOTO E.Security of Kuwakado-Tanaka transi-rive signature scheme for directed trees[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2004,E87-A(4):955-957.
  • 10YI X.Directed transitive signature scheme[A].CT-RSA 2007(LNCS 4377)[C].Spdnger-Verlag,2007.129-144.

共引文献46

同被引文献21

  • 1Honnutagi P S.The Hadoop distributed file system[J].International Journal of Computer Science & Information Technologies,2014,5(5):6238-6243.
  • 2O'Malley O,Zhang Kan,Radia S,et al.Hadoop security design[EB/OL].(2009-10).http:// www.valleytalk.org/wp-content/uploads/2013/03/hadoop-security-design.pdf.
  • 3Sadasivam G S,Kumari K A,Rubika S.A novel authentication service for Hadoop in cloud environment[C]//Proc of International Conference on Cloud Computing in Emerging Markets.2012:1-6.
  • 4Somu N,Gangaa A,Sriram V S S.Authentication service in Hadoop using one time pad[J].Indian Journal of Science and Technology,2014,7(4):56-62.
  • 5Quan Zhou,Xiao Deqin,Tang Chunming,et al.TSHC:trusted scheme for Hadoop cluster[C]//Proc of the 4th International Conference on Emerging Intelligent Data and Web Technologies.[S.l.]:IEEE Press,2013:344-349.
  • 6Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]//Advances in Cryptology.Berlin:Springer,2001:213-229.
  • 7Formal Systems (Europe) Ltd.Failures divergence refinement-FDR2 user manual[EB/OL].http://www.fsel.com/documentation/fdr2/fdr2manual.pdf.
  • 8Schneider S.Verifying authentication protocols in CSP[J].IEEE Trans on Software Engineering,1998,24(9):741-758.
  • 9Aiash M,Mapp G,Phan R C W,et al.A formally verified device authentication protocol using Casper/FDR[C]//Proc ofthe 11th Trust,Security and Privacy in Computing and Communications.[S.l.]:IEEE Press,2012:1293-1298.
  • 10李继国,姜平进.标准模型下可证安全的基于身份的高效签名方案[J].计算机学报,2009,32(11):2130-2136. 被引量:43

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部