Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

被引:12
|
作者
Zhang, Zhenfeng [1 ]
Yang, Kang [1 ]
Zhang, Jiang [2 ]
Chen, Cheng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
关键词
Digital signatures; Key substitution attacks; Provable security;
D O I
10.1007/978-3-319-27152-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though existential unforgeability under adaptively chosenmessage attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
引用
收藏
页码:140 / 153
页数:14
相关论文
共 50 条
  • [1] Security on SM2 and GOST Signatures against Related Key Attacks
    Cui, Handong
    Qin, Xianrui
    Cai, Cailing
    Yuen, Tsz Hon
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 155 - 163
  • [2] Continual leakage resilient SM2 signature scheme
    Ding Yujie
    Zhang Yingnan
    Zhou Tanping
    [J]. PROCEEDINGS OF 2020 3RD INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2020, : 931 - 936
  • [3] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [4] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [5] An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
    Ouyang, Senshan
    Liu, Xiang
    Liu, Lei
    Wang, Shangchao
    Shao, Baichuan
    Zhao, Yang
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (01): : 903 - 915
  • [6] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
    Liu, Mingjie
    Chen, Jiazhe
    Li, Hexin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
  • [7] Key Substitution Attacks on the CFS Signature
    Dou, Bennian
    Chen, Chun-Hua
    Zhang, Hong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 414 - 416
  • [8] Algorithm-Based Countermeasures against Power Analysis Attacks for Public-key Cryptography SM2
    Han, Xiaowei
    Wang, Beibei
    Wang, An
    Wu, Liji
    Rhee, Woogeun
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 435 - 439
  • [9] Non-interactive SM2 threshold signature scheme with identifiable abort
    Liang, Huiqiang
    Chen, Jianhua
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [10] An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p)
    Liu, Yanhua
    Guo, Wei
    Tan, Ya
    Wei, Jizeng
    Sun, Dazhi
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 250 - 258