检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]天津工业大学计算机科学与软件学院,天津300387
出 处:《计算机应用》2015年第A01期63-65,共3页journal of Computer Applications
摘 要:分析了Singh等(SINGH H,VERMA G.ID-based proxy signature scheme with message recovery.The Journal of Systems and Software,2012,85:209-214)提出的基于身份的具有消息恢复功能的代理签名方案,发现该方案是不安全的,并给出了一种伪造攻击,当攻击者获得一个有效的代理签名后,在不知道代理密钥的前提下,就可以对任何消息进行签名。为了克服该方案存在的安全缺陷,对其方案进行了改进,改进的方案可以有效抵抗这种伪造攻击,即当攻击者获得一个有效的代理签名后,在不知道代理密钥的前提下,也不可以对任何消息进行签名。与之前方案相比,效率更高,安全性更强,适用范围更广。The security of the ID-based proxy signature scheme with message recovery proposed by Singh et al. ( SINGH H, VERMA G. ID-based proxy signature scheme with message recovery. The Journal of Systems and Software, 2012, 85:209-214) was analyzed, and the scheme was found insecure. Meanwhile, a forgery attack on this scheme was given, when a valid proxy signature was obtained by the attacker, and on the premise of the proxy signing key was unknown, the proxy signature was generated for any message. In order to overcome the weakness of this scheme, this scheme was improved, and this improved scheme can efficiently resist the forgery attack, that is to say, when a valid proxy signature was obtained by the attacker, and on the premise the proxy signing key was unknown, the signature was not generated for any message. Compared with the previous scheme, this improved scheme is more efficient, secure, and has a wide application range.
关 键 词:代理签名 基于身份 可消息恢复的签名 伪造性攻击 安全性
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.191.136.109