首页 | 本学科首页   官方微博 | 高级检索  
     

对2个基于身份签名方案的伪造攻击
引用本文:陈 亮,崔永泉,田苗苗,付小青,徐 鹏.对2个基于身份签名方案的伪造攻击[J].通信学报,2013,34(2):123-127.
作者姓名:陈 亮  崔永泉  田苗苗  付小青  徐 鹏
作者单位:1. 华中科技大学 计算机科学技术学院,湖北 武汉 430074
2. 中国科学技术大学 计算机科学技术学院,安徽 合肥 230026
3. 河南科技学院 数学系,河南 新乡 453003
基金项目:国家自然科学基金资助项目(61100222,61100221);中央高校基本科研业务费专项基金资助项目(2011QN044);中国博士后科学基金资助项目(20100480900)~~
摘    要:对李—姜(2009)和谷—贾—姜(2011)依据Paterson方案(2006)分别提出的标准模型下基于身份的签名方案构造了3个有效的伪造攻击算法:攻击者在不得到任何签名用户私钥的情况下,仅通过选取随机参数以及多项式时间内的计算,便能够以显著的概率成功伪造任意用户对任意消息的有效签名。这些攻击算法显示李—姜和谷—贾—姜的基于身份签名方案都是不安全的。最后分析了方案遭受攻击的原因,并给出了2个可能的改进措施。

关 键 词:基于身份签名  伪造攻击  双线性映射

Forgery attacks on two identity based signature schemes
CHEN Liang,CUI Yong-quan,TIAN Miao-miao,FU Xiao-qing,XU Peng.Forgery attacks on two identity based signature schemes[J].Journal on Communications,2013,34(2):123-127.
Authors:CHEN Liang  CUI Yong-quan  TIAN Miao-miao  FU Xiao-qing  XU Peng
Affiliation:1. School of Computer Science and Technology,Huazhon niversity of Science and Technology,Wuhan 430074,China;2. School of Computer Science and Technology,University of Science and Technology of China,Hefei 230026,China;3. Department of Mathematics,Henan Institute of Science and Technology,Xinxiang 453003,China
Abstract:Li Ji-Guo et al.proposed an identity based signature scheme in the standard model in 2009,and a similar scheme was proposed by Gu Ke et al.in 2011.Three algorithms were constructed to attack these two schemes.In these attacks,attacker could forge a valid signature on any message on behalf of any user in polynomial time only by choosing random parameters without knowing the signing key of the user.The attacks showed that their signature schemes were insecure.The root causes of attacks were further analyzed and some possible improvements were given in the end.
Keywords:identity based signature  forge attack  bilinear map
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号