首页 | 本学科首页   官方微博 | 高级检索  
     

两种环签名方案的安全性分析及其改进
引用本文:王化群, 张力军, 赵君喜. 两种环签名方案的安全性分析及其改进[J]. 电子与信息学报, 2007, 29(1): 201-204. doi: 10.3724/SP.J.1146.2005.00574
作者姓名:王化群  张力军  赵君喜
作者单位:南京邮电学院信息工程系,南京,210003;大连水产学院信息工程学院,大连,116023;南京邮电学院信息工程系,南京,210003;南京邮电学院应用数理系,南京,210003
摘    要:通过对Xu(2004)和Zhang(2004)提出的两种环签名方案进行分析,指出了这两种环签名方案都容易受到群成员改变攻击(group-changing attack),并给出了攻击方法;另外,Zhang的方案还容易受到多已知签名存在伪造(multiple-known-signature existential forgery)攻击。为防范这两种攻击,对这两种环签名方案进行了改进,改进后的方案在最强的安全模型(Joseph, 2004提出)中仍是安全的。

关 键 词:环签名  双线性对  伪造攻击  GDP(Gap Diffie-Hellman)
文章编号:1009-5896(2007)01-0201-04
收稿时间:2005-05-23
修稿时间:2006-03-02

Cryptanalysis and Improvement of Two Ring Signature Schemes
Wang Hua-qun, Zhang Li-jun, Zhao Jun-xi. Cryptanalysis and Improvement of Two Ring Signature Schemes[J]. Journal of Electronics & Information Technology, 2007, 29(1): 201-204. doi: 10.3724/SP.J.1146.2005.00574
Authors:Wang Hua-qun  Zhang Li-jun  Zhao Jun-xi
Affiliation:Department of Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China; Information Engineering Institute, Dalian Fisheries University, Dalian 116023, China;Department of Applied Mathematics and Physics, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
Abstract:The security of the two ring signature schemes proposed by Xu(2004) and Zhang(2004) is analyzed, and it’s found that both the ring signature schemes are susceptible to group-changing attack. In addition, Zhang’s scheme can easily be attacked by multiple-known-signature existential forgery. To guard against the two attacks, the two ring signature schemes are improved, which can make the improved schemes is still secure even in the strongest security model (proposed by Joseph in 2004).
Keywords:Ring signature  Bilinear pairings  Forgery attack  GDP (Gap Diffie-Hellman)
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号