通信学报 ›› 2013, Vol. 34 ›› Issue (2): 123-127.doi: 10.3969/j.issn.1000-436x.2013.02.015

• 技术报告 • 上一篇    下一篇

对2个基于身份签名方案的伪造攻击

陈亮1,2,崔永泉1,田苗苗3,付小青1,徐鹏1   

  1. 1 华中科技大学 计算机科学技术学院,湖北 武汉 430074
    2 中国科学技术大学 计算机科学技术学院,安徽 合肥 230026
    3 河南科技学院 数学系,河南 新乡 453003
  • 出版日期:2013-02-25 发布日期:2017-07-17
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;中央高校基本科研业务费专项基金资助项目;国博士后科学基金资助项目

Forgery attacks on two identity based signature schemes

Liang CHEN1,2,Yong-quan CUI1,Miao-miao TIAN3,Xiao-qing FU1,Peng XU1   

  1. 1 School of Computer Science and Technology,Huazhon niversity of Science and Technology,Wuhan 430074,China
    2 School of Computer Science and Technology,University of Science and Technology of China,Hefei 230026,China
    3 Department of Mathematics,Henan Institute of Science and Technology,Xinxiang 453003,China
  • Online:2013-02-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities;The China Postdoctoral Science Foundation

摘要:

摘 要:对李—姜(2009)和谷—贾—姜(2011)依据Paterson方案(2006)分别提出的标准模型下基于身份的签名方案构造了3个有效的伪造攻击算法:攻击者在不得到任何签名用户私钥的情况下,仅通过选取随机参数以及多项式时间内的计算,便能够以显著的概率成功伪造任意用户对任意消息的有效签名。这些攻击算法显示李—姜和谷—贾—姜的基于身份签名方案都是不安全的。最后分析了方案遭受攻击的原因,并给出了2个可能的改进措施。

关键词: 基于身份签名, 伪造攻击, 双线性映射

Abstract:

Li Ji-Guo et al.proposed an identity based signature scheme in the standard model in 2009,and a similar scheme was proposed by Gu Ke et al.in 2011.Three algorithms were constructed to attack these two schemes.In these attacks,attacker could forge a valid signature on any message on behalf of any user in polynomial time only by choosing random parameters without knowing the signing key of the user.The attacks showed that their signature schemes were insecure.The root causes of attacks were further analyzed and some possible improvements were given in the end.

Key words: identity based signature, forge attack, bilinear map

No Suggested Reading articles found!