Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

被引:12
|
作者
Zhang, Zhenfeng [1 ]
Yang, Kang [1 ]
Zhang, Jiang [2 ]
Chen, Cheng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
关键词
Digital signatures; Key substitution attacks; Provable security;
D O I
10.1007/978-3-319-27152-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though existential unforgeability under adaptively chosenmessage attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
引用
下载
收藏
页码:140 / 153
页数:14
相关论文
共 50 条
  • [21] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Zhang, Yongxin
    Lei, Hong
    Wang, Bin
    Wang, Qinghao
    Lu, Ning
    Shi, Wenbo
    Chen, Bangdao
    Yue, Qiuling
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [22] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Yongxin Zhang
    Hong Lei
    Bin Wang
    Qinghao Wang
    Ning Lu
    Wenbo Shi
    Bangdao Chen
    Qiuling Yue
    Frontiers of Computer Science, 2024, 18
  • [23] A High Throughput SM2 Digital Signature Computing Scheme Based on Graphics Processing Unit Platform
    Zhu Hui
    Huang Yukun
    Wang Fengwei
    Yang Xiaopeng
    Li Hui
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4274 - 4283
  • [24] Anonymous Credential Protocol Based on SM2 Digital Signature
    Zhao Y.-Q.
    Yang X.-Y.
    Feng Q.
    Yu Y.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3469 - 3481
  • [25] Unbalancing Computations for SM2 Key Exchange Protocols
    Zhao, Chenxi
    Zhang, Jie
    Huang, Xin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 335 - 341
  • [26] Key substitution attacks on some provably secure signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 226 - 227
  • [27] Key substitution attacks on provably secure short signature schemes
    Tan, CH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (02) : 611 - 612
  • [28] Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
    Dou, Bennian
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1171 - 1172
  • [29] Robust key authentication scheme resistant to public key, substitution attacks
    Wu, TS
    Lin, HY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 157 (03) : 825 - 833
  • [30] Secure Two-Party SM2 Signature Algorithm
    Hou, Hong-Xia
    Yang, Bo
    Zhang, Li-Na
    Zhang, Ming-Rui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (01): : 1 - 8