信息网络安全 ›› 2016, Vol. 16 ›› Issue (9): 31-34.doi: 10.3969/j.issn.1671-1122.2016.09.006

• • 上一篇    下一篇

交互型电子签名的形式化分析

朱鹏飞1,2(), 张利琴2, 李伟2, 于华章2   

  1. 1.智能网络身份认证技术北京市工程实验室,北京 100085
    2.飞天诚信科技股份有限公司,北京 100085
  • 收稿日期:2016-07-25 出版日期:2016-09-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 朱鹏飞(1977—),男,江苏,工程师,博士,主要研究方向为信息安全;张利琴(1988—),女,河南,高级工程师,硕士,主要研究方向为信息安全;李伟(1970—),男,湖南,高级工程师,本科,主要研究方向为计算机技术;于华章(1971—),男,山东,助理研究员,硕士,主要研究方向为信息安全。

Formal Analysis on Interactive Electronic Signing

Pengfei ZHU1,2(), Liqin ZHANG2, Wei LI2, Huazhang YU2   

  1. 1. Beijing Engineering Laboratory of Smart Network Authentication, Beijing 100085, China
    2. Feitian Technologies Co., Ltd., Beijing 100085, China
  • Received:2016-07-25 Online:2016-09-20 Published:2020-05-13

摘要:

交互型电子签名是一种与特定类型的密钥载体紧密结合的电子签名应用。在攻击者通过劫持主机等方式远程控制密钥载体的情况下,交互型电子签名能够有效阻止其冒用合法用户身份进行交易或篡改交易信息。文章利用形式化方法对交互型电子签名方案设计的理论框架进行了探索,通过对交互型电子签名的调研,归纳了交互型电子签名的设计要点,指出骗签是交互型电子签名的突出安全威胁,并给出了骗签问题的形式化描述。文章还描述了密码行业标准框架下的交互型电子签名技术路线选型,从安全风险方面对若干基于国密算法的交互型电子签名方案进行比较。

关键词: 交互型电子签名, 形式化分析, 行业标准

Abstract:

Interactive electronic signing is a kind of electronic signature application closely integrated with specific types of key carriers. In the case of attackers remotely controlling the key carriers by the way of hijacking the hosts, interactive electronic signing can effectively prevent attackers from using the legitimate users’ identities to trade or tamper with the information. This article explores the theoretical framework of interactive electronic signing about scheme design based on formal analysis, sums up the design essentials of interactive electronic signing through the investigation, points out that cheat on signing is one of the major security threats of interactive electronic signing, and provides the formal description of the problem. This article also provides the technology route selection of interactive electronic signing under the framework of cryptographic industry standards, and intercompares some interactive electronic signing schemes based on national cryptographic algorithms from the aspect of security risks.

Key words: interactive electronic signing, formal analysis, industrial standards

中图分类号: