首页 | 本学科首页   官方微博 | 高级检索  
     检索      

对两个自认证公钥签名方案的安全性分析
引用本文:吴晨煌,黄慧,陈智雄.对两个自认证公钥签名方案的安全性分析[J].漳州师院学报,2010(2):31-35.
作者姓名:吴晨煌  黄慧  陈智雄
作者单位:[1]莆田学院数学与应用数学系,福建莆田351100 [2]漳州师范学院计算机科学与工程系,福建漳州363000
基金项目:福建省自然科学基金资助项目(2008F5049); 福建省属高校科研基金专项资助项目(JK2009019)
摘    要:通过对新近Lin等人提出的自认证公钥签名方案和王等人提出的自认证公钥签密方案进行了安全性分析,指出这两个方案都是不安全的.原因是这两个方案都能够受到替换公钥攻击,使得攻击者能够对任意选择的消息成功伪造签名.然而,在当前的自认证公钥签名方案的安全性证明中都没有考虑到替换公钥攻击,从而得到一个启示:由于自认证公钥签名自身的特点,那么在自认证公钥签名的安全性模型中必须进一步考虑是否能抵抗替换公钥攻击,从而确保方案的真正安全性.

关 键 词:自认证公钥  数字签名  攻击  双线性对  启示

Security Analysis of Two Self-certified Public Key Signature Schemes
WU Chen-huang,HUANG Hui,CHEN Zhi-xiong.Security Analysis of Two Self-certified Public Key Signature Schemes[J].Journal of ZhangZhou Teachers College(Philosophy & Social Sciences),2010(2):31-35.
Authors:WU Chen-huang  HUANG Hui  CHEN Zhi-xiong
Institution:1.Department of Mathematics,Putian University,Putian,Fujian 351100,China;2.Department of Computer Science and Engineering,Zhangzhou Normal University,Zhangzhou,Fujian 363000,China)
Abstract:In this paper,we analysis the two self-certified public key signature schemes recently proposed by Lin et al.and Wang et al.respectively.Unfortunately,the above two schemes are insecure,because they can suffer from the attack from the replacement public key so that any one can forge a valid signature on any message.Moreover,in all the self-certified public key signature schemes available nowadays,none of them consider the attack from the replacement public key.Thus,we get the enlightenment: because of the autologous feature of the self-certified public key signature scheme,the attack from the replacement public key must be taken into consideration in the security model of the self-certified public key signature scheme to guarantee the real security.
Keywords:self-certified public key  digital signature  attack  bilinear pairings  enlightenment
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号