首页 | 官方网站   微博 | 高级检索  
     

一个证实数字签名方案的安全缺陷
引用本文:王贵林,卿斯汉.一个证实数字签名方案的安全缺陷[J].软件学报,2004,15(5):752-756.
作者姓名:王贵林  卿斯汉
作者单位:1. Infocomm Security Department,Institute for Infocomm Research,21 Heng Mui Keng Terrace,Singapore 119613
2. 中国科学院,软件研究所,北京,100080;中国科学院,信息安全技术工程研究中心,北京,100080
基金项目:Supported by the National Natural Science Foundation of China under Grant No.60083007(国家自然科学基金);the National Grand Fundamental Research 973 Program of China under Grant No.G1999035810(国家重点基础研究发展规划(973))
摘    要:与普通的数字签名不同,验证者要知道一个证实数字签名的有效性,必须得到一个称为证实者的第三方的合作与帮助.但除了签名者,其他任何人(包括证实者)都不能以签名者的名义产生有效的证实签名.同时,只要参与了验证,证实者就不能欺骗验证者.进一步地,在必要的时候,证实者还可以将证实签名转化为普通的数字签名,从而使得任何人都可以验证这些签名的有效性.王尚平等学者提出了一个基于DSA和RSA的证实数字签名方案,并认为他们的方案是安全而高效的.与现有的具体方案相比,他们的方案确实是高效的.但是,这一方案存在严重的安全缺陷,从而使得他们的尝试是不成功的.

关 键 词:证实数字签名  不可否认签名  数字签名  信息安全
文章编号:1000-9825/2004/15(05)0752
收稿时间:2003/10/2 0:00:00
修稿时间:2003年10月2日

Security Flaws in a Confirmer Signature Scheme
WANG Gui-Lin and QING Si-Han.Security Flaws in a Confirmer Signature Scheme[J].Journal of Software,2004,15(5):752-756.
Authors:WANG Gui-Lin and QING Si-Han
Abstract:Confirmer signatures are different from standard signatures in the sense that without the help and cooperation of a designated confirmer, a verifier cannot determine the validity of a confirmer signature. But except of the signer, anyone else (including the confirmer) can not generate a valid confirmer signature on behalf of the signer. At the same time, the confirmer cannot cheat verifiers once he is involved in the procedure of signature verification. Furthermore, if it is necessary, the confirmer could convert confirmer signatures into standard ones such that the validity of these converted signatures can be publicly validated. Wang et al. proposed an efficient new confirmer signature scheme based on DSA and RSA, and claimed that their scheme is secure. However, several serious security flaws in their scheme are identified so that their investigation does not succeed.
Keywords:confirmer signature  undeniable signature  digital signature  information security
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号