Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2009, Vol. 32 ›› Issue (2): 115-118.doi: 10.13190/jbupt.200902.115.jiangh

• Reports • Previous Articles     Next Articles

Analysis and improvement of a Perfect Concurrent Signature Protocol

Jiang Han Qiuliang Xu 忠 张   

  • Received:2008-05-20 Revised:2009-01-18 Online:2009-04-28 Published:2009-04-28
  • Contact: Qiuliang Xu

Abstract:

A perfect concurrent signature protocol proposed by Huang et al in 2007 is analyzed. Two attacks are given out to show that there are two weaknesses in Huang's protocol: firstly, both participators A and B can change the signed messages after the concurrent signature protocol is completed; secondly, both A and B can forge a concurrent signature themselves. To prevent such forgery attacks, an improved protocol is proposed by adding authentication to the keystone information, and then the security of the improvement is analyzed.

Key words: Concurrent Signature, Perfect Concurrent Signature, Fair Contract Signing, Ring Signature