{"title":"基于身份的并发签名方案的密码分析与改进","authors":"Zhongjun Zhang, Shuo Xu","doi":"10.1109/ICSESS.2011.5982351","DOIUrl":null,"url":null,"abstract":"Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.","PeriodicalId":108533,"journal":{"name":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptanalysis and improvement of a concurrent signature scheme based on identity\",\"authors\":\"Zhongjun Zhang, Shuo Xu\",\"doi\":\"10.1109/ICSESS.2011.5982351\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.\",\"PeriodicalId\":108533,\"journal\":{\"name\":\"2011 IEEE 2nd International Conference on Software Engineering and Service Science\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 2nd International Conference on Software Engineering and Service Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2011.5982351\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 2nd International Conference on Software Engineering and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2011.5982351","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis and improvement of a concurrent signature scheme based on identity
Concurrent signatures were introduced as an alternative approach to solving the problem of fair exchange of signatures by Chen et al.[1], in which two entities can produce two signatures that are not binding, until the keystone is released by one of the parties. Recently, Huang et al.[10] proposed a more ambiguity and stronger fairness concurrent signature scheme based on identity. However, we will show that their scheme did not satisfy the strong unforgeability properties, and was vulnerable to forgery attack. Then, we propose an improved scheme to prevent such attack.