期刊文献+

基于身份的可验证加密签名协议的安全性分析 被引量:8

Cryptanalysis of an Identity-Based Verifiably Encrypted Signature Scheme
下载PDF
导出
摘要 利用Hess的基于身份的数字签名方案,Gu和Zhu提出了一个基于身份的可验证加密签名协议,并认为该协议在随机预言模型下是可证明安全的,从而可以作为基本模块用于构建安全的基于身份的公平交换协议.文章对该协议的安全性进行了深入分析,结果表明该协议存在如下的安全缺陷:恶意的签名者可以很容易地构造出有效的可验证加密签名,但是指定的仲裁者却不能把它转化成签名者的普通签名,因此不能满足可验证加密签名协议的安全需求;而且该协议容易遭受合谋攻击. Based on Hess's identity-based signature scheme, Gu and Zhu proposed an identitybased verifiably encrypted signature scheme in CISC 2005. The authors claim that their scheme is provably secure in the random oracle model and can be used as a primitive to construct identitybased optimistic fair exchange protocols. However, this paper shows that their protocol is insecure: A malicious signer can easily generate a valid verifiably encrypted signature, which can not be extracted into an ordinary signature by a designated adjudicator. Moreover, the protocol is also vulnerable to colluding attacks.
作者 张振峰
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1688-1693,共6页 Chinese Journal of Computers
基金 国家自然科学基金(60373039 90604018) 国家"九七三"重点基础研究发展规划项目基金(G1999035802)资助
关键词 基于身份的签名 可验证的加密签名 密码分析 双线性映射 identity-based signature verifiably encrypted signature cryptanalysis bilinear pairing
  • 相关文献

参考文献14

  • 1Asokan N. , Shoup V. , Waidner M.. Optimistic fair exchange of digital signatures. In: Proceedings of the Advances in Cryptology- EUROCRYPT' 98. Lecture Notes in Computer Science: 1403. Springer-Verlag, 1998, 591-606 被引量:1
  • 2Asokan N. , Shoup V. , Waidner M.. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communication, 2000, 18(4): 593-610 被引量:1
  • 3Bao F. , Deng R. H. , Mao W.. Efficient and practical fair exchange protocols with off-line TTP. In: Proceedings of the IEEE Symposium on Security and Privacy, 1998, 77-85 被引量:1
  • 4Ateniese G.. Verifiable encryption of digital signatures and applications. ACM Transactions on Information and System Security, 2004, 7(1): 1-20 被引量:1
  • 5Camenisch J. , Damgard I. B.. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In- Proceedings of the Advances in Cryptology-ASIACRYPT 2000. Lecture Notes in Computer Science: 1976. Springer-Verlag, 2000, 331-345 被引量:1
  • 6Boneh D. , Gentry C. , Lynn B. , Shacham H.. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology-EUROCRYPT'03.Lecture Notes in Computer Science: 2656. Springer-Verlag,2003, 416-432 被引量:1
  • 7Dodis Y. , Reyzin L.. Breaking and repairing optimistic fair exchange from PODC 2003. In: Proceedings of the ACM Workshop on Digital Rights Management, ACM, 2003, 47-54 被引量:1
  • 8Bao F.. Colluding attacks to a payment protocol and two signature exchange schemes. In: Proceedings of the Advances in Cryptology-ASIACRYPT 2004. Lecture Notes in Computer Science: 3329. Springer-Verlag, 2004, 417-429 被引量:1
  • 9Bellare M. , Rogaway P.. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st Annual Conference on Computer and Communications Security, ACM, 1993, 62-73 被引量:1
  • 10Shamir A.. Identity based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-Crypto' 84. Lecture Notes in Computer Science: 196. Springer-Verlag, 1984, 47-53 被引量:1

同被引文献104

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部