Computer Engineering and Applications ›› 2009, Vol. 45 ›› Issue (30): 13-14.DOI: 10.3778/j.issn.1002-8331.2009.30.005

• 博士论坛 • Previous Articles     Next Articles

Security analysis of verifiably encrypted signature scheme

XIA Qi,XU Chun-xiang   

  1. School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:2009-08-11 Revised:2009-09-14 Online:2009-10-21 Published:2009-10-21
  • Contact: XIA Qi

对一个可验证加密签名方案的安全性分析

夏 琦,许春香   

  1. 电子科技大学 计算机科学与工程学院,成都 610054
  • 通讯作者: 夏 琦

Abstract: The security of Yang et al. verifiably encrypted signature schemes is analyzed.Although the scheme is proved security in the standard model,it is vulnerable to key substitution attack in a multi-user setting,where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users.A concrete instance of fair exchange of digital signature protocol is given to show that this kind attack can breach the fairness when they are used in fair exchange in a multi-user setting.

Key words: verifiably encrypted signature, fair exchange, key substitution attack

摘要: 对Yang等最近提出的可验证加密签名方案进行了安全性分析,结论是虽然这个方案在标准模型下是可证明安全的,但是在多用户环境下容易遭受密钥替换攻击,即一个敌手能够生成一个新公钥满足合法签名者的可验证加密签名。给出了一个具体实例,说明容易遭受密钥替换攻击的可验证加密签名如果用于公平交换协议中,在多用户环境下会违背公平交换协议的公平性。

关键词: 可验证加密签名, 公平交换, 密钥替换攻击

CLC Number: