计算机应用
計算機應用
계산궤응용
COMPUTER APPLICATION
2010年
4期
1042-1044
,共3页
同底构造%代理签名%群签名%盲签名%公钥
同底構造%代理籤名%群籤名%盲籤名%公鑰
동저구조%대리첨명%군첨명%맹첨명%공약
identical base construction%proxy signature%group signature%blind signature%public key
在数字签名中,由于签名因子或整个签名方案设计的不合理,使得攻击者很容易通过将签名验证等式进行变形,将其转换成一个同底的等式,并通过指数的相等伪造出签名数据.针对此问题,提出同底构造攻击的概念,并明确指出,在进行数字签名设计时,必须回避这种现象.通过实例说明了这些例子中签名协议设计的不安全性,并给出一些通用方法说明如何对这些签名方案进行改进.
在數字籤名中,由于籤名因子或整箇籤名方案設計的不閤理,使得攻擊者很容易通過將籤名驗證等式進行變形,將其轉換成一箇同底的等式,併通過指數的相等偽造齣籤名數據.針對此問題,提齣同底構造攻擊的概唸,併明確指齣,在進行數字籤名設計時,必鬚迴避這種現象.通過實例說明瞭這些例子中籤名協議設計的不安全性,併給齣一些通用方法說明如何對這些籤名方案進行改進.
재수자첨명중,유우첨명인자혹정개첨명방안설계적불합리,사득공격자흔용역통과장첨명험증등식진행변형,장기전환성일개동저적등식,병통과지수적상등위조출첨명수거.침대차문제,제출동저구조공격적개념,병명학지출,재진행수자첨명설계시,필수회피저충현상.통과실례설명료저사례자중첨명협의설계적불안전성,병급출일사통용방법설명여하대저사첨명방안진행개진.
This paper studied many digital signature schemes and had found them insecure because of the irrationality of these signature factors or the whole signature scheme, which made the attackers be able to transform the signature verification equation into a equation with the same base number and easily forge signature datum through the equation of the two exponents. The paper proposed a new concept: the attack based on identical base construction, and explicitly indicated that defects could be avoided in designing digital signature. Meanwhile, four examples were given to illustrate the insecurity in signature designing. Finally, some general ways to improve these signature schemes were provided