期刊文献+

对两个基于离散对数的数字签名方案的攻击分析与改进 被引量:3

Attack analysis and improvement on two DL-based digital signature schemes
下载PDF
导出
摘要 利用陈宁宇等人(陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击.计算机应用,2010,30(4):1042-1044)提出的同底构造攻击方法对两个基于离散对数的数字签名方案进行了攻击分析。对李方伟等人(李方伟,谭利平,邱成刚,基于离散对数的代理盲签名.电子科技大学学报,2008,37(2):172-174)提出的一种改进的代理盲签名方案进行了攻击分析,发现不诚实的代理签名人利用伪造攻击,可以假冒代理签名接收人生成有效的代理盲签名。对LEIN HARN等人(HARN L,REN JIAN,LIN CHANGLU.Design of DL-based certificateless digital signatures.Journal of Systems and Software,2009,82(5):789-793)提出的一种基于离散对数的无证书签名方案进行了攻击分析,发现不诚实的密钥生成中心(PKG)可以伪造用户的私钥。给出了攻击的方法,分析了造成攻击的原因并提出了相应的改进措施。 The method of identical base construction attack on digital signature scheme proposed by CHEN NING-YU et al.(CHEN NING-YU,GU YONG-GEN,SU XIAO-PING.Identical base construction attack on digital signature scheme.Journal of Computer Applications,2010,30(4):1042-1044) was used to carry out attack analysis on the two DL-based digital signature schemes.The improved proxy blind signature scheme proposed by LI FANG-WEI et al.(LI FANG-WEI,TAN LI-PING,QIU CHENG-GNAG.A proxy blind signature scheme based on DLP.Journal of Electronic Science and Technology,2008,37(2):172-174.) was analytical attacked.It was found out that,using the forgery attack,a dishonest proxy signer could fake proxy signature receiver to generate valid proxy blind signature.A DL-based signature scheme without certificates proposed by Lein Harn et al.(HARN L,REN JIAN,LIN CHANGLU.Design of DL-based certificateless digital signatures.Journal of Systems and Software,2009,82(5):789-793) was analyzed and it was found that the dishonest Private Key Generator(PKG) can forge the user's private key.The cause of the attack was analyzed and the attack methods and the improvement measures were presented.
作者 范函 张少武
出处 《计算机应用》 CSCD 北大核心 2011年第7期1859-1861,1867,共4页 journal of Computer Applications
关键词 数字签名 离散对数 代理盲签名 无证书签名 同底构造攻击 digital signature discrete logarithm proxy blind signature certificateless digital signature identical base construction attack
  • 相关文献

参考文献12

  • 1DIFFIE W,HELLMAN M E.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654. 被引量:1
  • 2陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击[J].计算机应用,2010,30(4):1042-1044. 被引量:2
  • 3李方伟,谭利平,邱成刚.基于离散对数的代理盲签名[J].电子科技大学学报,2008,37(2):172-174. 被引量:7
  • 4HARN L, REN JIAN, LIN CHANGLU. Design of DL-based certificateless digital signatures[J]. The Journal of Systems and Software,2009,82(5):789-793. 被引量:1
  • 5MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,E79-A(9):1338-1354. 被引量:1
  • 6TAN ZUOWEN, LIN ZHOUJUN, TANG CHUNMING. Digital proxy blind signature schemes based on DLP and ECDLP[J]. MM Research Preprints,2002,21(7):212-217. 被引量:1
  • 7AWASTHI A K, SUNDER L. Proxy blind signature scheme[J]. Transactions on Cryptology, 2005, 2(1): 5-11. 被引量:1
  • 8SUN H M, HSIEH B T. On the security of some proxy blind signature schemes[EB/OL]. [2010-08-20]. http://eprint.iacr.org. 被引量:1
  • 9WANG SHAOBIN,HONG FAN,CUI GUOHUA. Secure efficient proxy blind signature schemes based DLP[C] // Proceedings of the Seventh IEEE International Conferenceon E-Commerce Technology. New York: IEEE,2005:452-455. 被引量:1
  • 10AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C] // Cryptology-Asiacrypt 2003,LNCS 2894. Berlin: Springer-Verlag, 2003: 452-473. 被引量:1

二级参考文献14

共引文献6

同被引文献23

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部