期刊文献+

一类ELGamal数字签名方案的安全性分析 被引量:5

Analysis on the Security of ElGamal Signature Scheme
下载PDF
导出
摘要 对一类原子原型的ELGamal签名变形方案进行有效的存在性伪造攻击,指出该类方案在实用中不可取。根据方案中是否应用杂凑函数将ELGamal签名体制分为两类,深入探讨了杂凑函数在签名中的作用。综述了基于ELGamal签名体制的可证明安全的一般方法,指出对基于ELGamal签名体制的实用签名方案的改进,应规定在带杂凑函数的三元组ELGamal签名方案中。 Existential forgery attack was effectively applied to a type of primitive ElGamal signature.It points out this type of scheme is not adoptable in the practice.According to whether applied hash function in the scheme,ElGamal signature scheme was divided into two types and the function of hash function in the signature scheme was profoundly analysed.The general method of provably secure is summarized,and pointed out improvability on all practical signature base on ElGamal scheme should be limited to the triplet ElGamal-family signatures with hash function.
出处 《科学技术与工程》 2010年第22期5417-5419,共3页 Science Technology and Engineering
关键词 ELGAMAL签名 存在性伪造 可证明安全 ElGamal signature existential forgery provably secure
  • 相关文献

参考文献8

  • 1ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transaction on Information Theory,1985; 31 (4):469-472. 被引量:1
  • 2Schnorr C P.Efficient signature generation for smart cards.Journal of Cryptology,1991; 4(3):161-174. 被引量:1
  • 3NIST.A Proposed Federal Information Processing Standard for Digital Signature Standard (DSS).Federal Register Announcement August 30,National Institute of Standards and Technology,1991. 被引量:1
  • 4曲娜,杜洪军,颜达,艾宏伟.ELGamal数字签名算法的一种变形[J].吉林大学学报(信息科学版),2009,27(6):590-594. 被引量:9
  • 5张会影,张军.一种改进的ElGamal数字签名方案的研究与设计[J].计算机工程与科学,2009,31(12):35-37. 被引量:6
  • 6Bellare M,Rogaway P.Provably secure session key distribution-the three party case.In Proceedings of 27th ACM Symposium on the Theory of Computing,ACM Press,1995:57-66. 被引量:1
  • 7Pointcheval D,Stern J.Security proofs for signature schemes.In U.Maurer,editor,Advances.In Cryptology-Proceedings of EUROCRYPT96,Springer-Verlag,1996:387-398. 被引量:1
  • 8Cramer R,Shoup V.A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack.In H.Krawczyk,editor,Advances in Cryptology-Proceedings of CRYPTO98,Lecture Notes in Computer Science 1462,Springer-Verlag,1998:13-25. 被引量:1

二级参考文献18

共引文献10

同被引文献34

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部