对一类群签名方案的伪造攻击
doi: 10.3724/SP.J.1146.2007.01234
Forgery Attacks on a Series Group Signature Schemes
-
摘要: 该文对王晓明等(2003)和林松等(2006)最近依据Tseng-Jan(1999)群签名方案各自提出的一种改进群签名设计了两种伪造攻击策略。利用该伪造攻击,攻击人不需要任何签名者的保密身份信息和秘密密钥信息,只是通过选取随机参数、改变原方案的部分设计步骤就能成功伪造出群成员证书,进而伪造出验证有效的群签名,从而威胁到群签名人的合法权益。该文的伪造攻击策略对Lee-Chang(1998)群签名、Tseng-Jan群签名及由其演化而来的所有群签名方案都具有效性,从而证明该类群签名方案全都是不安全的。
-
关键词:
- 群签名;伪造攻击;安全性分析
Abstract: Two kinds of forgery attacks strategy on the group signature schemes proposed respectively by Wang et al.. (2003) and Lin et al.. (2006) based on the Tseng-Jans(1999) group signature scheme is developed. Without using any secret identification or secret key, anyone can forgery a valid group member certificate and then generate a valid group signature using the forged certificate only through selecting some random parameters and changing the calculation procedures. Moreover, this kind of forgery attacks strategy can be used in Lee-Changs (1998) group signature scheme, Tseng-Jans group signature scheme and their varietals. It means this series of group signature schemes is insecure. -
Lee W B and Chang C C. Efficient group signature schemesbased on discrete logarithm[J].IEE Proc-Conput Digit Tech.1998, 145(1):15-18[2]Tseng Y M and Jan J K. Improved group signature schemebased on discrete logarithm[J].Electronics Letters.1999, 35(1):37-38[3]林松, 钭伟雨. 一种抗伪造攻击的改进的群签名方案. 四川大学学报(工程科学版), 2006, 38(1): 119-123.Lin Song and Dou Wei-yu. A group signature scheme forresisting forgery attack. Journal of Sichuan University(Engineering Science Edition), 2006, 38(1): 119-123.[4]唐春明, 刘卓军, 王明生. 改进Tseng-Jan 的群签名方案. 广州大学学报(自然科学版), 2005, 4(3): 205-208.Tang Chun-ming, Liu Zhuo-jun, and Wang Mings-heng.Improved Tseng-Jan 's group signature schemes. Journal ofGuangzhou University(Natural Science Edition), 2005, 4(3):205-208.[5]王晓明, 符方伟. 一种安全的群签名方案[J].电子与信息学报.2003, 25(5):657-663浏览[6]陈艳玲, 陈鲁生, 符方伟. 两种群签名方案的安全性分析[J].电子与信息学报.2005, 27(2):235-238浏览[7]曹正军. Wang-Fu 群签名方案的不可追踪性. 计算机工程与应用, 2006, 42(36): 142-143.Cao Zheng-jun. Untraceability of Wang-Fugroup signaturescheme. Computer Engineering and Applications, 2006,42(36): 142-143.
计量
- 文章访问数: 2937
- HTML全文浏览量: 102
- PDF下载量: 637
- 被引次数: 0