期刊文献+

对一个可验证加密签名方案的安全性分析

Security analysis of verifiably encrypted signature scheme
在线阅读 下载PDF
导出
摘要 对Yang等最近提出的可验证加密签名方案进行了安全性分析,结论是虽然这个方案在标准模型下是可证明安全的,但是在多用户环境下容易遭受密钥替换攻击,即一个敌手能够生成一个新公钥满足合法签名者的可验证加密签名。给出了一个具体实例,说明容易遭受密钥替换攻击的可验证加密签名如果用于公平交换协议中,在多用户环境下会违背公平交换协议的公平性。 The security of Yang et al. veriflably encrypted signature schemes is analyzed.Although the scheme is proved security in the standard model,it is vulnerable to key substitution attack in a multi-user setting,where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users.A concrete instance of fair exchange of digital signature protocol is given to show that this kind attack can breach the fairness when they are used in fair exchange in a multi-user setting.
作者 夏琦 许春香
出处 《计算机工程与应用》 CSCD 北大核心 2009年第30期13-14,18,共3页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)No.2009AA012415~~
关键词 可验证加密签名 公平交换 密钥替换攻击 verifiably encrypted signature fair exchange key substitution attack
  • 相关文献

参考文献9

  • 1Asokan N,Shoup V,Waidner M.Optimistic fair exchange of signature[C]//Proc of Eurocrypt'98.Berlin:Springer-Verlag, 1995:596-606.
  • 2Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//LNCS 2656:Proc of Eurocrypt 2003.[S.l.] : Springer-Verlag, 2003 : 416-432.
  • 3Zhang F G,Safavi R,Susilo W.Efficient verifiably encrypted signature and partially blind signature from bilinear pairings[C]//LNCS 2904:Proc of the Indocrypt 2003.[S.l.]:Springer-Verlag,2003:191-204.
  • 4Ateniese G.Verifiable encryption of digital signature and applications[J].ACM Transactions on Information and System Security, 2004,17(1):1-20.
  • 5杨浩淼,孙世新,徐继友.一种无随机预言机的高效可验证加密签名方案(英文)[J].软件学报,2009,20(4):1069-1076. 被引量:3
  • 6Gentry C.Practical identity based encryption without random oracles[C]//LNCS 4004 : Proc of Eurocrypt 06.[S.l.] : Springer-Verlag, 2006 : 445-464.
  • 7Menezes A,Smart N.Security of signature schemes in a multi-user setting[J].Des Codes Crypto,2004,33(3):261-274.
  • 8Tan C H.Key substitution attacks on some provably secure signature schemes[J].IEICE Trans Fundamentals,2004,E87-A(1):226-227.
  • 9李梦东,杨义先,马春光,蔡满春.利用双线性聚集签名实现公平的签名交换方案[J].通信学报,2004,25(12):59-64. 被引量:7

二级参考文献10

  • 1周永彬,张振峰,卿斯汉,季庆光.基于RSA签名的优化公平交换协议[J].软件学报,2004,15(7):1049-1055. 被引量:22
  • 2ASOKAN N, SHOUP V, WAIDNER M. Optimistic fair exchange of digital signatures[A]. Proceedings of Eurocrypt'98[C].Springer-Verlag, 1998.
  • 3ATENISE G. Efficient verifiable encryption (and fair exchange) of digital signatures[A]. Proceedings of Sixth ACM Conference on Computer and Communications Security[C]. Singapore, 1999. 138-146.
  • 4BONEH D, GENTRY C. Aggregate and verifiably encrypted signatures from bilinear maps[A]. Proceedings of Eurocrypt 2003[C].Springer-Verlag, 2003.614-629.
  • 5BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing[A]. Proceedings of Asiacrypt 2001[C]. Springer-Verlag,2001. 514-532.
  • 6GARAY J, JAKOBSSON M, MACKENZIE P. Abuse-free optimistic contract signing[A]. Proceedings of Crypto '99[C]. Springer-Verlag,2000. 449-466.
  • 7CAMINISCH J, SHOUP V. Practice verifiable encryption and decryption of discrete logarithms[A]. Proceedings of Crypto2003[C].Springer-Verlag, 2003.
  • 8BANRETO P, KIM H, LYNN B, et al. Efficient algorithm for pairing-based cryptosystems[A]. Crypto 2002[C]. Berlin, 2002.354-368.
  • 9蒋晓宁,叶澄清,潘雪增.基于半可信离线第三方的公平交易协议[J].计算机研究与发展,2001,38(4):502-508. 被引量:14
  • 10邓所云,詹榜华,胡正名,杨义先.一个优化的公平的电子支付方案[J].计算机学报,2002,25(10):1094-1098. 被引量:10

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部