计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (19): 273-281.DOI: 10.3778/j.issn.1002-8331.2411-0207

• 网络、通信与安全 • 上一篇    下一篇

基于椭圆曲线的可批量验证签名方案分析

项勇,李艳俊,王伊婷,刘健,丁漪   

  1. 中国电子科技集团公司 第十五研究所,北京 100083
  • 出版日期:2025-10-01 发布日期:2025-09-30

Analysis of Batch Verifiable Signature Scheme Based on Elliptic Curve

XIANG Yong, LI Yanjun, WANG Yiting, LIU Jian, DING Yi   

  1. The 15th Research Institute of China Electronics Technology Group Corporation, Beijing 100083, China
  • Online:2025-10-01 Published:2025-09-30

摘要: 分析了Ruan等人提出的SM2数字签名批量验证方案和Wu等人提出的双参数椭圆曲线批量验证方案,从商用密码应用安全性评估角度进行了密码协议正确性和安全性两方面的验证。针对Ruan等人的方案,指出方案的正确性分析不成立,并基于底层代数结构的椭圆曲线上点加运算规则给出详细推理和测试过程;针对Wu等人的方案,基于生日攻击原理分析了Hash函数错误使用方式导致的消息碰撞概率增大,整体签名方案在安全性方面难以抵御伪造攻击,并通过伪造具体消息和签名值给出伪造攻击过程和测试结果,基于车联网用户和路侧单元之间的交互信息给出了仿真测试。最后,给出在商用密码应用过程中将经典签名方案转化成批量验证方案时需要注意的关键点。

关键词: 数字签名, 批量验证, 正确性分析, 安全性分析, 伪造攻击

Abstract: There are two schemes analyzed in this paper, one is the SM2 digital signature batch verification scheme proposed by Ruan et al., and the other is the dual parameter elliptic curve batch verification scheme proposed by Wu et al. The correctness and security are verified from the perspective of commercial cryptographic application evaluation. For Ruan et al.’s scheme, it is pointed out that the correctness analysis of the scheme is not valid, and a detailed reasoning and testing process is provided following the point addition operation rules on elliptic curves based on the underlying algebraic structure. For Wu et al.’s scheme, according to the birthday attack principle, the incorrect use of Hash functions leads to an increased probability of message collision, so that the overall signature scheme is difficult to resist forgery attacks. The specific forgery attack process and test results are provided by forging messages and signature values, for which simulation tests are conducted by the information between car networking users and roadside units. Finally, several key points are presented to note when classic signature scheme is converted into batch verification scheme in commercial cryptographic applications.

Key words: digital signatures, batch verification, correctness analysis, safety analysis, forgery attacks