摘要
利用陈宁宇等人(陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击.计算机应用,2010,30(4):1042-1044)提出的同底构造攻击方法对两个基于离散对数的数字签名方案进行了攻击分析。对李方伟等人(李方伟,谭利平,邱成刚,基于离散对数的代理盲签名.电子科技大学学报,2008,37(2):172-174)提出的一种改进的代理盲签名方案进行了攻击分析,发现不诚实的代理签名人利用伪造攻击,可以假冒代理签名接收人生成有效的代理盲签名。对LEIN HARN等人(HARN L,REN JIAN,LIN CHANGLU.Design of DL-based certificateless digital signatures.Journal of Systems and Software,2009,82(5):789-793)提出的一种基于离散对数的无证书签名方案进行了攻击分析,发现不诚实的密钥生成中心(PKG)可以伪造用户的私钥。给出了攻击的方法,分析了造成攻击的原因并提出了相应的改进措施。
The method of identical base construction attack on digital signature scheme proposed by CHEN NING-YU et al.(CHEN NING-YU,GU YONG-GEN,SU XIAO-PING.Identical base construction attack on digital signature scheme.Journal of Computer Applications,2010,30(4):1042-1044) was used to carry out attack analysis on the two DL-based digital signature schemes.The improved proxy blind signature scheme proposed by LI FANG-WEI et al.(LI FANG-WEI,TAN LI-PING,QIU CHENG-GNAG.A proxy blind signature scheme based on DLP.Journal of Electronic Science and Technology,2008,37(2):172-174.) was analytical attacked.It was found out that,using the forgery attack,a dishonest proxy signer could fake proxy signature receiver to generate valid proxy blind signature.A DL-based signature scheme without certificates proposed by Lein Harn et al.(HARN L,REN JIAN,LIN CHANGLU.Design of DL-based certificateless digital signatures.Journal of Systems and Software,2009,82(5):789-793) was analyzed and it was found that the dishonest Private Key Generator(PKG) can forge the user's private key.The cause of the attack was analyzed and the attack methods and the improvement measures were presented.
出处
《计算机应用》
CSCD
北大核心
2011年第7期1859-1861,1867,共4页
journal of Computer Applications
关键词
数字签名
离散对数
代理盲签名
无证书签名
同底构造攻击
digital signature
discrete logarithm
proxy blind signature
certificateless digital signature
identical base construction attack