期刊文献+

一种服务器辅助验证聚合签名方案的安全性分析及改进

Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme
下载PDF
导出
摘要 为提高服务器辅助验证聚合签名的安全性,在共谋攻击和自适应选择消息攻击下,提出一种新的服务器辅助验证聚合签名的安全模型。分析了牛淑芬等人(计算机应用研究,2015年第7期)提出的基于聚合思想的服务器辅助验证签名方案的安全性,发现该方案无法抵抗服务器与非法签名者的共谋攻击。针对该安全性缺陷,在新的安全性定义下提出一种改进方案,并在共谋攻击和自适应选择消息攻击下证明了新方案是安全的。分析结果表明,该方案能有效降低签名验证算法的计算复杂度,并具有固定的聚合签名长度。 To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided aggregate verification scheme proposed by Niu et al (Application Research of Computers,2015,No.7),and finds that this scheme cannot resist collusion attack between a server and a signature forger.In view of security shortcomings,an improved scheme is proposed under the new security definition.The proposed scheme is proven to be secure under collusion attack and adaptive chosen message attack.Analysis results show that the new scheme can effectively reduce computational complexity of signature verification algorithm,and it has the fixed length of aggregate signature.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第1期183-187,共5页 Computer Engineering
关键词 服务器辅助验证聚合签名 共谋攻击 半可信服务器 非法签名者 双线性对 server-aided aggregate verification signature collusion attack half-trusted server signature forger bilinear pairing
  • 相关文献

参考文献1

二级参考文献14

  • 1国家密码管理局.SM2椭圆曲线公钥密码算法[EB/OL].http://www.OSCCR.govcn/UpFile/2010122214822692.pdf,2010-12-22/2012-09-11. 被引量:8
  • 2El Gamal T.A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[C]//Proceedings of CRYPTO’84.Berlin,Germany:Springer,1985:10-18. 被引量:1
  • 3Schnorr C P.Efficient Identification and Signatures for Smart Cards[C]//Proceedings of CRYPTO’89.Berlin,Germany:Springer,1990:239-252. 被引量:1
  • 4Schnorr C P.Efficient Signature Generation by Smart Cards[J].Journal of Cryptology,1991,4(3):161-174. 被引量:1
  • 5Pointcheval D,Stern J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology,2000,13(3):361-396. 被引量:1
  • 6Vaudenay S,Pointcheval D.On Provable Security for Digital Signature Algorithms,LIENS-96-17[R].LIENS,1996. 被引量:1
  • 7Lim C,Lee P.The Korean Certificate-based Digital Signature[J].Computers & Electrical Engineering,1999,25(4):249-265. 被引量:1
  • 8Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,2001,1(1):36-63. 被引量:1
  • 9American National Standards Institute.ISO/IEC 14888-3-2013 Information Technology-Security Techniques-Digital Signatures with Appendix,Part 3:Discrete Logarithm Based Mechanisms[S].2013. 被引量:1
  • 10Michels M,Naccache D,Petersen H.GOST 34.10-A Brief Overview of Russia’s DSA[J].Computers & Security,1996,15(8):725-732. 被引量:1

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部