首页> 外文会议>International conference on security standardisation research >Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks
【24h】

Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

机译:SM2签名方案针对广义密钥替换攻击的安全性

获取原文

摘要

Though existential unforgeability under adaptively chosen-message attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
机译:尽管对于数字签名方案的安全性而言,在自适应选择消息攻击下存在的不可伪造性已为人们所接受,但针对密钥替换攻击的安全性也很受关注,并且已被一些实用的数字签名方案(如DSA和ECDSA)考虑。在本文中,我们考虑了通用密钥替换攻击,其中基本元素被视为公共密钥的一部分并且可以被替换。我们首先显示,ISO / IEC 14888-3中定义的基于证书的签名方案的通用框架容易受到通用密钥替换攻击的攻击。然后我们证明,如果基础哈希函数h是统一的并且具有抗冲突能力,并且基础转换函数f是几乎可逆的,那么在通用组模型中,中文标准SM2签名方案对于通用选择模型中的自适应选择消息攻击是存在不可伪造的。如果将基础哈希函数H和h建模为非可编程随机预言(NPRO),则数字签名方案可以安全地抵抗广义密钥替换攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号