期刊文献+

无可信PKG的盲签名方案的安全性分析及改进

Security analysis and improvement of blind signature scheme without trusted PKG
下载PDF
导出
摘要 针对周萍等人的无可信PKG的盲签名方案详细分析了其安全性,指出方案不能抵抗敌手AⅠ伪造攻击,敌手AⅠ可对用户的部分公钥进行替代,生成对任意消息的合法盲签名。为此,提出了相应的改进方案。改进的方案在验证等式中增加了系统参数,有效地证明了签名者拥有合法的SID,从而防止了敌手AⅠ的公钥替代攻击。分析表明,改进的方案是安全的,能抵抗敌手AⅠ,AⅡ,AⅢ的伪造攻击。 This paper analyzed the security of blind signature scheme without trusted PKG proposed by Zhou Ping,et al. It showed that the scheme couldn't resist the forgery attack of the type one adversary AⅠ. The adversary AⅠcould substitute the user's partial public key and forge a valid blind signature on the arbitrary message. Therefore,this paper proposed an improved scheme. In the improved scheme,it added some system parameters in the verification equation,thus effectively proved the validity of the signer's SIDand resisted the public key replacement attack of adversary AⅠ. Analysis result shows that the improved sheme is secure,it can resist the forgery attacks of the adversary AⅠ,AⅡand AⅢ.
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期873-875,890,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(U1433130) 四川省重点基金资助项目(SZD0802-09-1) 西华大学重点实验室开放研究基金资助项目(S2jj2012-029)
关键词 盲签名 基于身份 无可信私钥生成中心 伪造攻击 替代公钥 blind signature ID-based without trusted PKG forgery attack substitute public key
  • 相关文献

参考文献12

二级参考文献68

  • 1张学军,王育民.新的基于身份无可信中心的盲签名和代理签名[J].计算机工程与应用,2007,43(1):142-144. 被引量:12
  • 2顾纯祥,祝跃飞,潘晓豫.Forking引理与一类基于身份签名体制的安全性证明(英文)[J].软件学报,2007,18(4):1007-1014. 被引量:4
  • 3张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 4SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology-CRYPTO'84[C]. Heidelberg: Springer-Verlag, 1984. 47-53.
  • 5HESS E Efficient identity based signature schemes based on pairings[A]. Selected Areas in Cryptography the 9th Annual International Workshop, SAC 2002[C]. Heidelberg: Springer-Verlag, 2002. 310-324.
  • 6CHA J, CHEON J. An identity-based signature from gap Diffie-Hellman groups[A]. Public Key Cryptography-PKC 2003[C]. Heidelberg: Springer-Verlag, 2003.18-30.
  • 7AL-RIYAMI S, PATERSON K, CBE from CL-PKE: a generic construction and efficient schemes[A]. Public Key Cryptography-PKC 2005: the 8th International Workshop on Theory and Practice in Public Key Cryptography[C]. Heidelberg: Springer-Verlag, 2005. 398-415.
  • 8LIU J, SUN R, KOU W, et al. Efficient ID-based signature without trusted PKG[EB/OL]. http://eprint.iacr.org/2007/135, 2007.
  • 9CHAUM D. Blind signatures for untraceable payments[A]. Advances in Crypto'82[C]. Plenum, NY, 1982. 199-203.
  • 10ABE M, FUJISAKI E. How to date blind signatures[A]. Advances in Cryptology-AisaCrypt'96[C]. Heidelberg: Springer-Verlag, 1996. 244-251.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部