计算机科学 ›› 2013, Vol. 40 ›› Issue (5): 136-140.

• 信息安全 • 上一篇    下一篇

基于双线性对的部分盲签名中的“约分攻击”

侯整风,王鑫,韩江洪,朱晓玲   

  1. 合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受安徽省自然科学基金(090412051),广东省教育部产学研结合项目(2008B0905002400)资助

“Reduction Attacks” in Partially Blind Signature Based on Bilinear Pairings

HOU Zheng-feng,WANG Xin,HAN Jiang-hong and ZHU Xiao-ling   

  • Online:2018-11-16 Published:2018-11-16

摘要: 研究了3个基于双线性对的部分盲签名方案,发现其签名公式存在相似性。随后对3种相应的“约分攻击”方法进行了对比分析,指出上述3个方案存在篡改协商信息攻击的根本原因。由上述分析结果得出一类基于双线性对的部分盲签名方案存在“约分攻击”的推论,并进一步对上述推论进行了验证。

关键词: 双线性对,部分盲签名,篡改协商信息攻击

Abstract: We studied three partially blind signature schemes,and found out the similarity in signature formulas of the three schemes.Then we compared and analized the three corresponding methods of“reduction attacks”,and the basic reason why these schemes are vulnerable to tampering common information attacks was pointed out.From the above analysis results,we deduced the conclusion that a class of partially blind signature schemes based on bilinear pairings are vulnerable to “reduction attacks”.Moreover,the deduction was verified.

Key words: Bilinear pairings,Partially blind signature,Tampering common information attacks

[1] Chaum D.Blind signatures for untraceable payments[C]∥Proc.Advances in Cryptology-Crypto’82.Santa Barbara,California,USA,Aug.1982:199-203
[2] Abe M,Fujisaki E.How to Date Blind Signature[C]∥Asia-crypt’96,LNCS 1136.Berlin:Springer-Verlag,1996:244-251
[3] Chien H Y,Jan J K,Tseng Y M.RSA-Based Partially Blind Signature with Low Computation[C]∥IEEE 8th International Conference on Parallel and Distributed Systems.2001:385-389
[4] Wen H A,Lee K C,Hwang S Y,et al.On the traceability on RSA-based partially signature with low computation[J].Applied Mathematics and Computation,2005,2:421-425
[5] Fang De-jian,Wang Na,Liu Cheng-lian.An Enhanced RSA-based Partially Blind Signature[C]∥2010International Confe-rence on Computer and Communication Technologies in Agriculture Engineering.2010:565-567
[6] Chow S S M,Hui L C K,Yiu S M,et al.Two improved partially blind signature schemes from bilinear pairings[C]∥Proc.Australasian Conference on Information Security and Pricacy-ACISP 2005,LNCS 3574.Brisbane,Australia:Springer-Verlag,2005:316-328
[7] Hu Xiao-ming,Huang Shang-teng.An Effcient ID-based PartiallyBlind Signature Scheme[C]∥Eighth ACIS International Confe-rence on Software Engineering,Artificial Intelligence,Networking,and Parallell Distributed Computing.IEEE,2007:291-296
[8] 张学军,王育民.高效的基于身份的部分盲签名方案[J].计算机工程与应用,2007,43(11):211-213
[9] 荣维坚.无证书部分盲签名方案[J].漳洲师范学院学报:自然科学版,2008,62(4):44-47
[10] 崔巍,辛阳,胡程瑜,等.高效的基于身份的(受限)部分盲签名[J].北京邮电大学学报,2008,31(4):53-57
[11] Kang Bao-yuan,Han Jin-guang.On thesecurity of blind signature and partially blindsignature,Education Technology and Computer(ICETC)[C]∥20102nd International Conference.V5,0:206-208
[12] 闫东升.一个新的高效的基于身份的部分盲签名方案[J].计算机工程与应用,2008,44(2):137-140
[13] 李明祥,王涛,罗新方.对两种基于双线性对的部分盲签名方案的密码学分析[J].计算机应用研究,2011,28(2):435-438

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!