计算机应用 ›› 2011, Vol. 31 ›› Issue (07): 1859-1861.DOI: 10.3724/SP.J.1087.2011.01859

• 信息安全 • 上一篇    下一篇

对两个基于离散对数的数字签名方案的攻击分析与改进

范函1,2,张少武1   

  1. 1. 信息工程大学 电子技术学院,郑州 450004
    2. 许继昌南通信设备有限公司,河南 许昌 461000
  • 收稿日期:2010-12-27 修回日期:2011-01-28 发布日期:2011-07-01 出版日期:2011-07-01
  • 通讯作者: 范函
  • 作者简介:范函(1963-),男,河南许昌人,工程师,硕士研究生,主要研究方向:密码学、数字签名;张少武(1964-),男,河南洛阳人,教授,主要研究方向:密码学、信息安全。

Attack analysis and improvement on two DL-based digital signature schemes

Han FAN1,2,Shao-wu ZHANG1   

  1. 1. Institute of Electronic Technology,Information Engineering University,Zhengzhou Henan 450004,China
    2. XJ Changnan Communications Equipment Company Limited,Xuchang Henan 461000,China
  • Received:2010-12-27 Revised:2011-01-28 Online:2011-07-01 Published:2011-07-01
  • Contact: Han FAN

摘要: 利用陈宁宇等人(陈宁宇,顾永跟,苏晓萍.数字签名方案的同底构造攻击. 计算机应用,2010,30(4):1042-1044)提出的同底构造攻击方法对两个基于离散对数的数字签名方案进行了攻击分析。对李方伟等人(李方伟,谭利平,邱成刚,基于离散对数的代理盲签名. 电子科技大学学报,2008,37(2):172-174)提出的一种改进的代理盲签名方案进行了攻击分析,发现不诚实的代理签名人利用伪造攻击,可以假冒代理签名接收人生成有效的代理盲签名。对LEIN HARN等人(HARN L, REN JIAN, LIN CHANGLU. Design of DLbased certificateless digital signatures. Journal of Systems and Software,2009,82(5):789-793)提出的一种基于离散对数的无证书签名方案进行了攻击分析,发现不诚实的密钥生成中心(PKG)可以伪造用户的私钥。给出了攻击的方法,分析了造成攻击的原因并提出了相应的改进措施。

关键词: 数字签名, 离散对数, 代理盲签名, 无证书签名, 同底构造攻击

Abstract: The method of identical base construction attack on digital signature scheme proposed by CHEN NINGYU et al. (CHEN NING-YU, GU YONG-GEN, SU XIAO-PING. Identical base construction attack on digital signature scheme. Journal of Computer Applications,2010,30(4):1042-1044) was used to carry out attack analysis on the two DLbased digital signature schemes. The improved proxy blind signature scheme proposed by LI FANGWEI et al. (LI FANG-WEI,TAN LI-PING,QIU CHENG-GANG.A proxy blind signature scheme based on DLP. Journal of Electronic Science and Technology, 2008,37(2):172-174.) was analytical attacked. It was found out that, using the forgery attack, a dishonest proxy signer could fake proxy signature receiver to generate valid proxy blind signature. A DL-based signature scheme without certificates proposed by Lein Harn et al. (HARN L, REN JIAN, LIN CHANGLU. Design of DLbased certificateless digital signatures. Journal of Systems and Software,2009,82(5):789-793) was analyzed and it was found that the dishonest Private Key Generator (PKG) can forge the users private key. The cause of the attack was analyzed and the attack methods and the improvement measures were presented.

Key words: Digital signature, Discrete logarithm, Proxy blind signature, Certificateless digital signature, Identical base construction attack