期刊文献+

两种签密方案的安全分析 被引量:1

Security analysis of two signcryption schemes
在线阅读 下载PDF
导出
摘要 通过对一种基于身份的签密方案和一种多接收者的签密方案进行分析,展示出这2种方案是不安全的,尽管这2种方案在文献中被证明在随机预言模型下是安全的,但是它们存在着伪造攻击.在基于身份的签密方案中,一个不诚实的接收者可以伪造任意消息m的签密文,并且一个敌手在挑战阶段可以区分一个挑战密文;在多接收者签密方案中,任意一个接收者能够代表其他接收者伪造一个消息m的签密文.为了克服这2种方案的缺陷,分别通过对S进行约束和改变原方案的哈希值的输入来阻止上面的攻击. The security of an ID-based signcryption scheme and a multi-recipient signcryption scheme are analyzed. It is shown that these two signcryption schemes are insecure although they were proven to be secure under the random oracle model in existing references. In the ID-based signcryption scheme, any dishonest receiver can forge a signcryption on arbitrary message m, and the adversary can distinguish the challenged ciphertext in the challenge phase. In the multi-recipient signcryption scheme, any receiver can forge a signcryption of message m on behalf of the other receivers. To overcome the flaws of these two schemes, it is suggested to restrict S of signcryption in the first scheme and modify the inputs of hash function in the second scheme to resist the above attacks.
作者 张键红
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第A01期29-33,共5页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(60703044) 教育部新世纪优秀人才计划资助项目(NCET-06-188) 北京市科技新星计划资助项目(2007B-001)
关键词 签密 安全分析 伪造 signcryption security analysis forgery
  • 相关文献

参考文献12

  • 1Zheng Y.Digital signcryption or how to achieve cost (signature & encryption)《cost(signature)+cost (encryption)[C]//Advances in Cryptology-Crypto97,LNCS 1294.Springer-Verlag,1997:165-179.
  • 2Baek J,Steinfeld R,Zheng Y.Formal proofs for the security of signcryption[C]//Public Key Cryptography-PKC'02,LNCS 2274.Springer-Verlag,2002:80-98.
  • 3Boyen X.Multipurpose identity-based signcryption:a Swiss ary knifefor identity-based cryptology[C]//Advances in Cryptology-Crypto'03,LNCS 2729.Springer-Verlag,2003:383-399.
  • 4Libert B,Quisquater J.Efficient signcryption with key privacy from gap Diffie-Hellman groups[C]//PKC04,LNCS 2947.Springer-Verlag,2004:187-200.
  • 5Tan Chi-How.On the security of signcryption scheme with key privacy[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2005,E88(4):1093-1095.
  • 6Duan S,Cao Z.Efficient and provably secure multi-receiver identity-based signcryption[C]//ACISP 2006.Springer-Verlag,2006:195-206.
  • 7Malone-Lee John,Mao Wenbo.Two birds one stone:signcryption using RSA[C]//CT-RSA 2003,LNCS 2616.Springer-Verlag,2003:211-225.
  • 8Libert B,Quisquater J.A new identity based signcryption schemes from pairings[C]//2003 IEEE Information Theory Workshop.France,2003:155-158.
  • 9Chow M S,Yiu S M,Hui L,et al.Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity[C]//ICISC 2003,LNCS 2971.Springer-Verlag,2004:352-369.
  • 10Barreto P S,Libert B,McCullagh N,et al.Effiient and provably-secure identity-based signatures and signcrypion from bilinear maps[C]//ASIACRYPT 2005,LNCS 3788.Springer-Verlag,2005:515-532.

二级参考文献21

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:104
  • 3Zheng Y.. Digital signcryption or how to achieve cost (signature & encryption<< cost (signature) + cost (encryption). In:Kaliski Jr B. S. ed.. Advances in Cryptology-CRYPTO' 97,Lecture Notes in Computer Science 1294. Berlin: Springer-Verlag, 1997, 165-179
  • 4Gamage C. , Leiwo J. , Zheng Y.. Encrypted message authentication by firewalls. In: Imai H. , Zheng Y. eds.. Public Key Cryptography-PKC' 99, Lecture Notes in Computer Science 1560. Berlin: Springer-Verlag, 1999, 69-81
  • 5Pang X. , Tan K. L. , Wang Y. , Ren J.. A secure agent-mediated payment protocol. In: Deng R. H. , Qing S. , Bao F. ,Zhou J. eds.. Information and Communications Security-ICICS 2002, Lecture Notes in Computer Science 2513. Berlin:Springer-Verlag, 2002, 422-433
  • 6Shamir A.. Identity-based cryptosystems and signature schemes. In: Blakley G. R. , Chaum D. eds.. Advances in Cryptology-CRYPTO'84, Lecture Notes in Computer Science 196. Berlin: Springer-Verlag, 1984, 47-53
  • 7Boneh D. , Franklin M.. Identity-based encryption from the Weil pairing. In: Kilian J. ed.. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001, 213-229
  • 8Malone-Lee J.. Identity based signcryption. Cryptology ePrint Archive, Report 2002/098, IACR, 2002
  • 9Libert B. , Quisquater J.. A new identity based signcryption schemes from pairings. In: Proceeding of the 2003 IEEE Information Theory Workshop, Paris, France, 2003, 155-158
  • 10Nalla D., Reddy K. C.. Signcryption scheme for identity-based cryptosystems. Cryptology ePrint Archive, Report2003/066, IACR, 2003

共引文献76

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部