首页 | 官方网站   微博 | 高级检索  
     

对一种基于身份的已知签名人的门限代理签名方案的分析
引用本文:鲁荣波,何大可,王常吉.对一种基于身份的已知签名人的门限代理签名方案的分析[J].电子与信息学报,2008,30(1):100-103.
作者姓名:鲁荣波  何大可  王常吉
作者单位:1. 吉首大学数学与计算机科学学院,吉首,416000;西南交通大学信息安全与国家计算网格实验室,成都,610031
2. 西南交通大学信息安全与国家计算网格实验室,成都,610031
3. 中山大学计算机科学系,广州,510275
基金项目:国家自然科学基金 , 湖南省自然科学基金
摘    要:在TAMC'06上,Bao等人以双线性对为工具,首次提出了一种基于身份的已知签名人的门限代理签名方案(以下标记为BCW方案),并得出了满足强不可伪造性以及原始签名人发送签名了的授权证书时并不需要安全信道等安全性结论.本文对BCW方案进行了安全性分析,成功地给出了一种攻击,攻击者通过公开渠道获得一个合法的原始签名人发送给代理签名人的签名了的授权证书以及代理签名人已经生成的一个有效的代理签名后,能够伪造出一个新的对相同消息的代理签名,而原始签名人变为攻击者自己.由于验证者并不能验证代理签名人到底是代表谁生成了代理签名, 这样,攻击者就获得了与合法原始签名人相同的权益.为了避免这种攻击,本文提出了改进的措施,分析表明,改进措施能有效地弥补了该方案的安全缺陷.

关 键 词:门限代理签名  代理签名  基于身份的公钥体系  不可伪造性  分布式计算  基于身份  名人  门限  代理签名  签名方案  分析表  Known  Signature  Scheme  Proxy  Threshold  安全缺陷  改进  权益  代表  验证  渠道  攻击者  安全性  安全信道  授权证书
文章编号:1009-5896(2008)01-0100-04
收稿时间:2006-08-17
修稿时间:2006-12-25

Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers
Lu Rong-bo,He Da-ke,Wang Chang-ji.Cryptanalysis of an Identity-Based Threshold Proxy Signature Scheme with Known Signers[J].Journal of Electronics & Information Technology,2008,30(1):100-103.
Authors:Lu Rong-bo  He Da-ke  Wang Chang-ji
Affiliation:College of Mathematics and Computer Science, Jishou University, Jishou 416000, China;Laboratory of Information Security and National Computing Gird, Southwest Jiaotong University, Chengdu 610031, China; Department of Computer Science, Sun Yat-Sen University, Guangzhou 510275, China
Abstract:In TAMC' 06, Bao et al. proposed a new identity-based threshold proxy signature with known signers from the bilinear pairings (denoted as BCW scheme) for the first time. As for the security, they claimed their scheme satisfies the security requirements of proxy signature such as strong unforgeability and their scheme need not the secure channel for the delivery of the signed warrant and etc.. In this paper, however, an attack against their scheme is presented. That is, based on the proxy signature generated by proxy signers on a message on behalf of an original signer, an attacker can forge a valid threshold proxy signature on the same message which seemed generated by proxy signers on behalf of this attacker himself. After production a forged proxy signature, the attacker has the same authority with the original signer to the proxy signer, and the verifier cannot distinguish that which one is the real original signer. To thwart this attack, an improvement measure is further proposed, which can resolve the security problem existing in this scheme.
Keywords:Threshold proxy signature  Proxy signature  Identity-based public key cryptography  Unforgeability  Distributed computing
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号