Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (4): 1042-1046.DOI: 10.11772/j.issn.1001-9081.2014.04.1042

Previous Articles     Next Articles

Security-analysis of a kind of generalized group-oriented threshold signcryption schemes

MO Lequn1,2,GUO Gengqi2,LI Feng2   

  1. 1. Management School, Jinan University, Guangzhou Guangdong 510632, China
    2. School of Computer Engineering, Guangdong Communication Polytechnic, Guangzhou Guangdong 510650, China
  • Received:2013-10-12 Revised:2013-12-26 Online:2014-04-01 Published:2014-04-29
  • Contact: MO Lequn
  • Supported by:

    ;the Guangdong Provincial Natural Science Foundation of China

一类面向群组通信的通用门限签密方案的安全性研究分析

莫乐群1,2,郭庚麒1,李锋1   

  1. 1. 广东交通职业技术学院 计算机工程学院,广州 510650;
    2. 暨南大学 管理学院,广州 510632
  • 通讯作者: 莫乐群
  • 作者简介:莫乐群(1976-),男,广东东莞人,讲师,博士研究生,CCF会员,主要研究方向:信息系统、信息安全;
    郭庚麒(1966-),男,广东潮州人,教授,主要研究方向:计算机网络、高性能存储;
    李锋(1982-),男,广东河源人,讲师,硕士,主要研究方向:网络安全。
  • 基金资助:

    国家自然科学基金资助项目;广东省农业标准化研究项目

Abstract:

The threshold signcryption is a very useful cryptographic primitive. Recently, a generalized group-oriented threshold signcryption scheme was proposed by Peng et al.(PENG C, LI X, LUO W. A generalized group-oriented threshold signcryption schemes [J]. Acta Electronica Sinica, 2007, 35(1): 64-67), but Wang (WANG Y. Cryptanalysis and improvement of threshold signcryption scheme [J]. Computer Engineering and Applications, 2012, 48(1): 125-127) pointed out that there was a weakness in it because of the management of the keys, and an improved scheme was given. But both of the two schemes have the similar encryption structure, that is, if some members of the signcryption group colluded together in the key generation stage, they could avoid the authentication and deny that they had taken part in process of the signcryption. Furthermore, an improved group-oriented threshold signcryption scheme was proposed to resist the above attack and the attack proposed by Wang. It not only inherits the advantages of the above schemes, but also is more efficient in the process of parameters exchange.

摘要:

为更有效地进行群组签密及消息共享验证,彭长根等(彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67)提出了一种面向群组通信的通用门限签密方案(Peng方案),而后王勇兵(王勇兵.一种门限签密方案的分析与改进[J].计算机工程与应用,2012,48(1):125-127)对Peng方案进行了安全性分析指出其在管理群组及成员的公私钥方面存在的安全漏洞,并提出一种改进方案(Wang方案)。由于上述两方案采用了类似的加密方法,通过给定具体的攻击方式:即部分签密组成员在生成加密密钥时合谋作弊,就能在群组签密中隐匿个人签名信息达到签名抵赖的目的;指出了Peng方案及Wang方案均存在安全漏洞,并针对该安全漏洞及Wang所述的攻击,提出一种新的改进方案,该方案不仅继承上述方案的优点,而且在签密参数交换过程中更具效率。

CLC Number: