首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份的门限代理签名的安全性分析与改进
引用本文:崔巍,颜雪枫,沈鸣,郭沛猛,胡博. 基于身份的门限代理签名的安全性分析与改进[J]. 计算机与数字工程, 2012, 40(2): 72-74
作者姓名:崔巍  颜雪枫  沈鸣  郭沛猛  胡博
作者单位:1. 科学技术部信息中心 北京100862
2. 第二炮兵政治部侦察技术室 北京 100085
摘    要:通过对张建中等人提出的基于身份的门限代理签名方案进行安全分析,发现该方案不能抵御合谋攻击,任意t个代理签名人都可以合谋获得其他n-t代理签名人用来生成代理密钥的足够信息,从而伪造他们进行签名。为了避免这种攻击,提出了一种新的基于身份的门限代理签名,新方案克服了原方案的安全缺陷,不仅能够抵抗合谋攻击,而且满足门限代理签名方案的安全要求。相比已有方案,新方案在代理密钥生成、代理签名生成和总运算量具有明显的优势。

关 键 词:基于身份  门限代理签名  合谋攻击

Cryptanalysis and Improvement of ID-based Threshold Proxy Signature Scheme
CUI Wei , YAN Xuefeng , SHEN Ming , GUO Peimeng , HU Bo. Cryptanalysis and Improvement of ID-based Threshold Proxy Signature Scheme[J]. Computer and Digital Engineering, 2012, 40(2): 72-74
Authors:CUI Wei    YAN Xuefeng    SHEN Ming    GUO Peimeng    HU Bo
Affiliation:1.Information Center of Ministry of Science and Technology,Beijing 100862)(2.The Second Artillery Political Department Reconnaissance Technology Room,Beijing 100085)
Abstract:Through the cryptanalysis of identity-based threshold proxy signature proposed by ZHANG Jianzhong,which can not resist conspiracy attack,it is shown that any t proxy signers can conspire to gain enough information of other n-t proxy signers to generate proxy key and forge their signature.To avoid this attack,a new identity-based threshold proxy signature is proposed,which can resolve the security problem existing in existing scheme.The new scheme can resist the conspiracy attack and meets the safe requirements of threshold proxy signature scheme.Compared with existing scheme,the proposed scheme has obvious advantages in proxy key generation,proxy signature generation and total amount of calculation.
Keywords:ID-based  bilinear pairing  threshold proxy signature  conspiracy attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号