CRYPTANALYSIS OF THE HARN AND WANG MODIFICATION OF THE XINMEI DIGITAL SIGNATURE SCHEME

被引:5
|
作者
ALABADDI, M [1 ]
WICKER, SB [1 ]
机构
[1] GEORGIA INST TECHNOL,SCH ELECT ENGN,ATLANTA,GA 30332
关键词
ERROR CORRECTION CODES; INFORMATION THEORY;
D O I
10.1049/el:19921118
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Xinmei has devised a digital signature scheme based on error correcting codes. Harn and Wang have observed that the combination of valid signatures produced by the Xinmei digital signature scheme yields valid signatures for other messages. Ham and Wang have proposed a modified version of the Xinmei scheme that prevents such selective forgeries. The authors of the Letter have previously shown that the Xinmei scheme can be totally broken by a chosen-ciphertext attack with complexity O(n3), where n is the length of the code used in the scheme. In the Letter it is shown that the Ham and Wang modified scheme can be broken by a known-plaintext attack with complexity O(k3).
引用
收藏
页码:1756 / 1758
页数:3
相关论文
共 50 条
  • [21] Fault cryptanalysis of ElGamal signature scheme
    Biernat, J
    Nikodem, M
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 327 - 336
  • [22] Cryptanalysis of a Certificateless Aggregate Signature Scheme
    Kumar, Pankaj
    Sharma, Vishnu
    Sharma, Gaurav
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1095 - 1098
  • [23] Cryptanalysis of a Generalized Ring Signature Scheme
    Wang, Huaqun
    Zhang, Futai
    Sun, Yanfei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) : 149 - 151
  • [24] Cryptanalysis of a certificateless aggregate signature scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Wang, Huige
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1353 - 1358
  • [25] Cryptanalysis of an efficient group signature scheme
    Xie, Qi
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (06): : 1511 - 1513
  • [26] Double-way authentication access control scheme based on Harn's digital signature
    Shi, R.H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2001, 24 (04): : 400 - 404
  • [27] Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures
    Wu, HJ
    Bao, F
    Deng, RH
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 173 - 179
  • [28] Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme
    Srivastava, Vikas
    Debnath, Sumit Kumar
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 296 - 308
  • [29] Cryptanalysis of the TRMS signature scheme of PKC'05
    Bettale, Luk
    Faugere, Jean-Charles
    Perret, Ludovic
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 143 - 155
  • [30] CRYPTANALYSIS OF CERTAIN VARIANTS OF RABINS SIGNATURE SCHEME
    SHAMIR, A
    SCHNORR, CP
    INFORMATION PROCESSING LETTERS, 1984, 19 (03) : 113 - 115