Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks

被引:14
|
作者
Zhang, Zhenfeng [1 ]
Yang, Kang [1 ]
Zhang, Jiang [2 ]
Chen, Cheng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
关键词
Digital signatures; Key substitution attacks; Provable security;
D O I
10.1007/978-3-319-27152-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though existential unforgeability under adaptively chosenmessage attacks is well-accepted for the security of digital signature schemes, the security against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider generalized key substitution attacks where the base element is considered as a part of the public key and can be substituted. We first show that the general framework of certificate-based signature schemes defined in ISO/IEC 14888-3 is vulnerable to a generalized key substitution attack. We then prove that the Chinese standard SM2 signature scheme is existentially unforgeable against adaptively chosen-message attacks in the generic group model if the underlying hash function h is uniform and collision-resistant and the underlying conversion function f is almost-invertible, and the SM2 digital signature scheme is secure against the generalized key substitution attacks if the underlying hash functions H and h are modeled as non-programmable random oracles (NPROs).
引用
收藏
页码:140 / 153
页数:14
相关论文
共 50 条
  • [41] Secure Multi-party SM2 Signature Based on SPDZ Protocol
    Li, Xiaotong
    Wang, Hao
    Chen, Jiyang
    Li, Shikuan
    Sun, Yuxiang
    Su, Ye
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 85 - 103
  • [42] On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks
    Kim, S
    Mambo, M
    Okamoto, T
    Shizuya, H
    Tada, M
    Won, D
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01) : 231 - 238
  • [43] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    ScienceChina(InformationSciences), 2019, 62 (03) : 61 - 74
  • [44] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    Science China Information Sciences, 2019, 62
  • [45] Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
    Mai, Long
    Yan, Yuan
    Jia, Songlin
    Wang, Shuran
    Wang, Jianqiang
    Li, Juanru
    Ma, Siqi
    Gu, Dawu
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 430 - 446
  • [46] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [47] A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
    Qian, Wenfei
    Wang, Pingjian
    Lei, Lingguang
    Chen, Tianyu
    Zhang, Bikuan
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 818 - 824
  • [48] Key Substitution Attack and Malleability of a Short Signature Scheme with Batch Verification
    Kong, Fanyu
    Yu, Jia
    RECENT TRENDS IN MATERIALS AND MECHANICAL ENGINEERING MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 55-57 : 1605 - +
  • [49] Finite-key security against coherent attacks in quantum key distribution
    Sheridan, Lana
    Le, Thinh Phuc
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2010, 12
  • [50] Security of quantum key distribution against all collective attacks
    Biham, E
    Boyer, M
    Brassard, G
    van de Graaf, J
    Mor, T
    ALGORITHMICA, 2002, 34 (04) : 372 - 388