Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

被引:14
|
作者
Zhang, Zhenfeng [1 ]
Yang, Kang [1 ]
Zhang, Jiang [2 ]
Chen, Cheng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
关键词
Digital signatures; Key substitution attacks; Provable security;
D O I
10.1007/978-3-319-27152-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though existential unforgeability under adaptively chosenmessage attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
引用
收藏
页码:140 / 153
页数:14
相关论文
共 50 条
  • [31] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares
    Koga, Hiroki
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2483 - 2487
  • [32] An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
    Daniel, Renu Mary
    Rajsingh, Elijah Blessing
    Silas, Salaja
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 156 - 172
  • [33] Security Analysis of the First Certificateless Proxy Signature Scheme against Malicious-But-Passive KGC Attacks
    Lin, Xi-Jun
    Wang, Qihui
    Sun, Lin
    Yan, Zhen
    Liu, Peishun
    Liu, Peishun (liups@ouc.edu.cn), 1600, Oxford University Press (64): : 653 - 660
  • [34] Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
    Lin, Xi-Jun
    Wang, Qihui
    Sun, Lin
    Yan, Zhen
    Liu, Peishun
    COMPUTER JOURNAL, 2021, 64 (04): : 653 - 660
  • [35] Study on Secret Sharing for SM2 Digital Signature and Its Application
    Ding, Fan
    Long, Yihong
    Wu, Peili
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 205 - 209
  • [36] Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
    An, Youngjoo
    Lee, Hyang-Sook
    Lee, Juhee
    Lim, Seongan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [37] Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles
    Yang, Mei
    Liu, Chong
    Li, Huiyun
    Shao, Cuiping
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 890 - 896
  • [38] An improved defense scheme against attacks on wireless security
    Li, Hua
    Reizvikh, Dimitri
    Lei, Lucy
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 986 - 989
  • [39] Security of Public Key Encryption Against Resetting Attacks
    Kraemer, Juliane
    Struck, Patrick
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 508 - 528
  • [40] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115