首页 | 本学科首页   官方微博 | 高级检索  
     

门限代理签名方案的安全性分析
引用本文:祁传达,李亚梅,金晨辉. 门限代理签名方案的安全性分析[J]. 计算机工程与设计, 2006, 27(10): 1767-1768
作者姓名:祁传达  李亚梅  金晨辉
作者单位:信阳师范学院,数学与信息科学学院,河南,信阳,464000;解放军信息工程大学,电子技术学院,河南,郑州,450004
基金项目:河南省杰出青年科学基金
摘    要:在Sun提出的门限代理签名方案的基础上,Yang、Tzeng和Hwang等人于2003年提出了一个在算法和通信方面都更有效的门限代理签名方案(简称YTH方案).对YTH方案进行了安全性分析,指出该方案容易受到内部攻击,即原始签名者在代理签名组不知情的情况下,可以伪造一个由任意t个代理签名者参与的对任何消息的代理签名.由于原始签名者能够绕过代理签名组伪造代理签名,所以该签名方案不符合数字签名所必须满足的不可伪造性和不可否认性原则.

关 键 词:数字签名  多重签名  代理签名  门限代理签名  安全性
文章编号:1000-7024(2006)10-1767-02
收稿时间:2005-04-10
修稿时间:2005-04-10

Analysis of security in threshold proxy signature scheme
QI Chuan-da,LI Ya-mei,JIN Chen-hui. Analysis of security in threshold proxy signature scheme[J]. Computer Engineering and Design, 2006, 27(10): 1767-1768
Authors:QI Chuan-da  LI Ya-mei  JIN Chen-hui
Affiliation:1. College of Mathematics and Information Science, Xinyang Normal University, Xinyang 464000, China; 2. Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China
Abstract:Based on Sun's threshold proxy signature scheme,Yang C Y,Tzeng S F,Hwang M S andet al presented a new threshold proxy signature scheme in 2003,which is more efficient both in algorithm and communication.The new scheme is henceforth called YTH-scheme.The security of YTH-scheme was analyzed.The result of the analysis showed that YTH-scheme is vulnerable to insider attacks,which means a malicious original signer can forge a proxy signature on any information made by any of proxy signers together without noticed by the group of proxy signers.Because of this,YTH-scheme cannot meet the needs of digital signature,such as un-forgeable and undeniable.
Keywords:digital signature   multi-signature   proxy signature   threshold proxysignature   security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号