摘要
现有对抗碰撞散列函数的攻击,严重威胁到先"散列"再"签名"的签名算法的安全性。使用随机散列构造RMX来构造此类签名算法的安全性可以不依赖于底层散列函数的离线碰撞稳固性,但前提必须假设签名者不作弊。通过改变随机数的选取方式以及增加消息提供者的签名验证对使用RMX算法的签名算法进行了改进,改进后的算法不需要再假定签名者是诚实的。此外,对Halevi等人提出的随机函数构造rc(M)=Hc(r|■rc(M))的安全性进行了研究,并给出了关于该构造的一个安全紧规约。
The collision attacks against popular hash functions have a profound effect on the security of hash-then-sign digital signatures. The randomized RMX scheme, when used in conjunction with hash-then-sign signature schemes, flees these schemes from their current essential dependency on full collision resistance, on the assumption that the signer doesn't cheat. RMX scheme is enhanced through changing the choose method of the random value as well as the verification processor by message provider. The security of the enhanced scheme does not need the assumption that the signer is honest at all. In addition, the security of another randomized construction Hr^c(M) = H^c(r/Hr^c(M)) is discussed and a tight reduction is also given out.
出处
《通信学报》
EI
CSCD
北大核心
2008年第10期101-107,共7页
Journal on Communications
基金
国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311203)
国家自然科学基金资助项目(90718001)
高等学校学科创新引智计划资助项目(B08004)~~