首页 | 本学科首页   官方微博 | 高级检索  
     

内部安全模型下几个签密方案的密码分析
引用本文:周才学.内部安全模型下几个签密方案的密码分析[J].计算机应用研究,2012,29(9):3493-3496.
作者姓名:周才学
作者单位:九江学院 信息科学与技术学院,江西 九江,332005
摘    要:针对五个文献中的六个签密方案,分析了它们在内部安全模型下的保密性和不可伪造性。分析表明有五个方案存在保密性攻击,有四个方案存在伪造性攻击,提出了一些针对这些方案的攻击方法,并分析了攻击成功的原因。针对这些方案的安全缺陷,使用签名部分绑定接收者和加密部分绑定发送者的方法,分别给出了能有效克服攻击的改进措施。

关 键 词:签密  无证书签密  多接收者签密  内部安全模型  前向安全性  公开可验证性

Cryptanalysis of some signcryption schemes in insider-security model
ZHOU Cai-xue.Cryptanalysis of some signcryption schemes in insider-security model[J].Application Research of Computers,2012,29(9):3493-3496.
Authors:ZHOU Cai-xue
Affiliation:School of Information Science & Technology, University of Jiujiang, Jiujiang Jiangxi 332005, China
Abstract:This paper analyzed the confidentiality and unforgeability of six signcryption schemes in five papers under insider-security model. The analysis results show that there's existing confidentiality attacks in five schemes and forgeability attacks in four schemes. Then this paper presented some concrete attack methods for these schemes, and analyzed the reasons for the success of attacks. According to the security flaws of these schemes, using the methods of binding receiver in signature part and binding sender in encryption part, it put forward countermeasures against these attacks respectively.
Keywords:signcryption  certificateless signcryption  multi-receiver signcryption  insider-security model  forward security  public verification
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号