首页 | 本学科首页   官方微博 | 高级检索  
     

数字签名方案的同底构造攻击
引用本文:陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击[J].计算机应用,2010,30(4):1042-1044.
作者姓名:陈宁宇  顾永跟  苏晓萍
作者单位:1. 湖州师范学院2.
摘    要:在数字签名中,由于签名因子或整个签名方案设计的不合理,使得攻击者很容易通过将签名验证等式进行变形,将其转换成一个同底的等式,并通过指数的相等伪造出签名数据。针对此问题,提出同底构造攻击的概念,并明确指出,在进行数字签名设计时,必须回避这种现象。通过实例说明了这些例子中签名协议设计的不安全性,并给出一些通用方法说明如何对这些签名方案进行改进。

关 键 词:同底构造    代理签名    群签名    盲签名    公钥
收稿时间:2009-08-18
修稿时间:2009-10-03

Identical base construction attack on digital signature scheme
CHEN Ning-yu,GU Yong-gen,SU Xiao-ping.Identical base construction attack on digital signature scheme[J].journal of Computer Applications,2010,30(4):1042-1044.
Authors:CHEN Ning-yu  GU Yong-gen  SU Xiao-ping
Affiliation:School of Information and Engineering/a>;Huzhou Teachers College/a>;Huzhou Zhejiang 313000/a>;China
Abstract:This paper studied many digital signature schemes and had found them insecure because of the irrationality of these signature factors or the whole signature scheme,which made the attackers be able to transform the signature verification equation into a equation with the same base number and easily forge signature datum through the equation of the two exponents.The paper proposed a new concept:the attack based on identical base construction,and explicitly indicated that defects could be avoided in designing ...
Keywords:identical base construction  proxy signature  group signature  blind signature  public key  
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号