[1]李顺波[][],黄光球[],彭家龙[]. 一种前向安全数字签名方案的分析及改进[J].计算机技术与发展,2016,26(11):93-96.
 LI Shun-bo[][],HUANG Guang-qiu[],PENG Jia-long[]. Analysis and Improvement for a Digital Signature Scheme of Forward Security[J].,2016,26(11):93-96.
点击复制

 一种前向安全数字签名方案的分析及改进()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年11期
页码:
93-96
栏目:
安全与防范
出版日期:
2016-11-10

文章信息/Info

Title:
 Analysis and Improvement for a Digital Signature Scheme of Forward Security
文章编号:
1673-629X(2016)11-0093-04
作者:
 李顺波[1][2] 黄光球[1] 彭家龙[2]
 1.西安建筑科技大学 管理学院;2.西安建筑科技大学 理学院
Author(s):
 LI Shun-bo[1][2] HUANG Guang-qiu[1] PENG Jia-long[2]
关键词:
 前向安全后向安全数字签名ElGamal 单向散列链
Keywords:
 forward-securebackward-securedigital signatureElGamalone-way hash chain
分类号:
TP309
文献标志码:
A
摘要:
 前向安全在实际应用中能有效减少私钥泄露对过去时间段签名带来的损失,但会影响未来时段签名的安全性。针对未来时间段的私钥泄露问题,提出了一种强前向安全的数字签名方案。先是对刘亚丽(2010)等提出的基于模m的n方根难题的ElGamal前向安全数字签名方案进行了分析,发现该方案并不能保证未来时间段签名的安全性,即不具备后向安全。于是借助单向散列链技术对该方案的私钥更新和签名算法进行了有效改进,在刘亚丽所提方案的基础上构造了一种基于ElGamal体制的数字签名方案,并对该方案进行了分析。分析结果表明,新方案是正确有效的,同时具有前向安全性和后向安全性。
Abstract:
 Forward security can effectively reduce the damage caused by exposure of the secret key in the past time period,but may affect the signature in the future period. In order to solve this problem,a strong forward-secure signature is proposed. Firstly,Liu Yali’ s ElGa-mal forward-secure signature scheme in 2010 based on n root of module m is analyzed,and this scheme is not backward security,which means it can’ t guarantee the signature security in the future period. Then,by using a one-way hash chain,the key updating and signature algorithm is improved effectively. A new digital signature scheme based on ElGamal is presented on the basis of Liu’ s scheme and ana-lyzed. The result shows that the new scheme is correct and feasible,with forward and backward security.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(11):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(11):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(11):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(11):47.
[11]王少辉,刘天,李静,等. 阅读器破坏条件下RFID前向安全认证协议[J].计算机技术与发展,2016,26(09):134.
 WANG Shao-hui,LIU Tian,LI Jing,et al. Forward Secure Authentication Protocol of RFID with Reader Corruption[J].,2016,26(11):134.

更新日期/Last Update: 2016-12-13