Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

被引:14
作者
Zhang, Zhenfeng [1 ]
Yang, Kang [1 ]
Zhang, Jiang [2 ]
Chen, Cheng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
来源
SECURITY STANDARDISATION RESEARCH, SSR 2015 | 2015年 / 9497卷
关键词
Digital signatures; Key substitution attacks; Provable security;
D O I
10.1007/978-3-319-27152-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though existential unforgeability under adaptively chosenmessage attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
引用
收藏
页码:140 / 153
页数:14
相关论文
共 17 条
  • [1] [Anonymous], 2010, 000322012 GMT
  • [2] [Anonymous], 148883 ISOIEC
  • [3] Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1560, P154
  • [4] Bohli J.M., 2006, INT J INF SECUR, V5, P30, DOI DOI 10.1007/S10207-005-0071-2
  • [5] Generic groups, collision resistance, and ECDSA
    Brown, DRL
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) : 119 - 152
  • [6] Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
  • [7] Geiselmann W., 2003, 2003245 CRYPT EPRINT
  • [8] Goldwasser S., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P441, DOI 10.1109/SFCS.1984.715946
  • [9] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [10] International Organization for Standardization, 2015, 118892015 ISOIEC