期刊文献+

身份基广义指定验证者签密方案的分析

Analysis of Universal Designated Verifier Identity-Based Signcryption Scheme
在线阅读 下载PDF
导出
摘要 为了更好地探究广义指定验证者签密方案的安全性,对一个随机预言机模型下的身份基广义指定验证者签密方案进行了安全性分析,利用接收者与任意第三方合谋的方法对原方案进行了伪造性攻击。本文通过对原方案的具体攻击,演示了一个恶意的接收者可以与某个第三方合谋来破坏方案的不可伪造性。该攻击表明原方案是不安全的,难以在实际环境中进行应用。 To further explore the security of universal designated verifier signcryption systems,this paper analyses the security of a universal designated verifier identity-based signcryption scheme in the random oracle model.A forgery attack is made on the scheme by using the method of colluding with any third party by the receiver.Through the attack of the original scheme,this paper shows that a malicious receiver can collude with any third party to break the unforgeability of the scheme.The attack shows that the original scheme is insecure to be applied in the real environment.
作者 徐明恒 周才学 XU Mingheng;ZHOU Caixue(School of Computer and Big Data Science,Jiujiang University,Jiujiang,China,332005)
出处 《福建电脑》 2021年第9期50-52,共3页 Journal of Fujian Computer
基金 江西省教育厅科技项目(No.GJJ201807)资助。
关键词 广义指定验证者签密 身份基 双线性对 随机预言机 Universal Designated Verifier Signcryption Identity-Based Bilinear Pairings Random Oracle Model
  • 相关文献

参考文献6

二级参考文献44

  • 1LI Fagen,HU Yupu,LIU Shuanggen.Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings[J].Wuhan University Journal of Natural Sciences,2007,12(1):17-20. 被引量:5
  • 2Steinfeld R, Bull L, Wang H, et al.Universal designated-verifier signatures[C]//LNCS 2894: Proceedings of Advances in Cryptology-Asiacrypt' 03, Taipei, Taiwai, November 30-December 4, 2003.Berlin : Springer-Verlag, 2003 : 522-542.
  • 3Zhang Fan-guo, Susilo W, Mu Yi, et al.Identity-based universal designated verifier signature[C]//LNCS 3823: Proceedings of EDC Workshops' 05, Nagasaki, Japan, December 6-9,2005.Berlin: Springer-Verlag, 2005 : 825-834.
  • 4Shao Zu-hua.Self-certified signature scheme from pairings[J]. The Journal of Systems and Sofrware,2007(80):388-395.
  • 5Wang Gui-lin.Universal forgery on a group signature scheme using self-certified public keys[J].Information Processing Letters, 2004 (89) : 227-231.
  • 6Tseng Y, Jan J,Chien H.Digital signature with message recovery using self-certified public keys and its variants[J].Applied Mathematics and Computation, 2003 (136) : 203 -214.
  • 7MING Yang SHEN Xiao-qin WANG Yu-min.Certificateless universal designated verifier signature schemes[J].The Journal of China Universities of Posts and Telecommunications,2007,14(3):85-90. 被引量:8
  • 8ZHENG Y L. Digital signcryption or how to achieve cost(signature & encryption) <C cost ( signature) + cost ( encryption)[C] // Proceedings of the 17th Annual International Cryptology Con-ference on Advances in Cryptology. Berlin: Springer, 1997: 165 -179.
  • 9BAEK J, STEINFELD R, ZHENG Y L. Formal proofs for the secur-ity of signcryption[ C] // Proceedings of the 5 th International Work-shop on Practice and Theory in Public Key Cryptosystems. Berlin:Springer-Verlag, 2002: 81 -98.
  • 10MALONE-LEE J. Identity-based signcryption[ EB/OL]. [2013-06-14]. http: //eprint. iacr. org/2002 /098. pdf.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部