Phân tích về hai lỗi của ECDSA và các biến thể so với GOST R34.10-2012
Abstract- ECDSA and GOST R 34.10-2012 signature schemes are considered as the most secure and popular signature schemes in recently. However, the comparisons about security and efficiency of these schemes are still open problems. In this article, we will compare ECDSA and some its variants with GOST R 34.10-2012 based on two flaws [1] of ECDSA. In particular, we show that these two flaws can be easily found in some variants of ECDSA, but GOST R 34.10-2012 can resist them. We also surveyed more about two of ECDSA flaws on ECGDSA scheme and EC-Schnorr scheme.
Xem toàn bộ bài báo tại đây.
Tài liệu tham khảo [1]. J. Stern, D. Pointcheval, J.M. Lee, N.P. Smart, “Flaws in Applying Proof Methodologies to Signature Schemes”, CRYPTO 2002. [2]. D. R. L. Brown, “Generic groups, collision resistance, and ECDSA”, http://eprint.iacr.org/2002/026, 2002. [3]. Hu Junru, “The Improved Elliptic Curve Digital Signature Algorithm”, IEEE, 2011. [4]. A. Antipa, D. Brown, R. Gallant, R. Lambert, R. Struik, S. Vanstone, “Accelerated Verification of ECDSA Signatures”, Selected Areas in Cryptography, Vol. 3897, pp. 307-318, 2005. [5]. Greeshma Sarath, Devesh C Jinwala and Sankita Patel, “A survey on Elliptic Curve Digital Signature Algorithm and its variants”, 2014. [6]. GOST R34.10-2012 (Bản dịch tiếng Việt). [7]. Technical Guideline TR-03111 Elliptic Curve Cryptography Version 2.0, Germany, http://www.bsi.bund.de. |
Nguyễn Quốc Toàn, Triệu Quang Phong, Nguyễn Tiến Xuân