ElGamal signature scheme immune to fault analysis

被引:0
|
作者
Nikodem, Maciej [1 ]
机构
[1] Wroclaw Univ Technol, Inst Comp Engn Control & Robot, PL-50372 Wroclaw, Poland
关键词
ElGamal signature scheme; fault attacks; error diffusion;
D O I
10.1109/DepCoS-RELCOMEX.2008.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption. and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes. OF In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
引用
收藏
页码:355 / 362
页数:8
相关论文
共 50 条
  • [21] Forgery attack to ElGamal type message recovery digital signature scheme
    Information Security Center, Beijing Univ. of P. and Telecom., Beijing 100876, China
    Chin J Electron, 4 (379-381):
  • [22] A novel ElGamal type threshold signature scheme without a trusted party
    Zhang, Wenfang
    Liu, Xingyu
    He, Dake
    Wang, Xiaomin
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 3119 - +
  • [23] Forgery attack to ElGamal type message recovery digital signature scheme
    Li, Zichen
    Yang, Yixian
    Wu, Weiling
    Chinese Journal of Electronics, 1999, 8 (04): : 379 - 381
  • [24] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
  • [25] Fault analysis-resistant implementation of Rainbow Signature Scheme
    Nakkar, Mouna
    Mahmoud, Moustafa
    Youssef, Amr
    2017 29TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2017, : 95 - 99
  • [26] Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications
    R. Anusha
    R. Saravanan
    Soft Computing, 2025, 29 (3) : 1473 - 1496
  • [27] On the Uniformity of Distribution of the ElGamal Signature
    Igor E. Shparlinski
    Applicable Algebra in Engineering, Communication and Computing, 2002, 13 : 9 - 16
  • [28] On the uniformity of distribution of the ElGamal signature
    Shparlinski, IE
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) : 9 - 16
  • [29] Threshold signature schemes for ElGamal variants
    Kim, Sungwook
    Kim, Jihye
    Cheon, Jung Hee
    Ju, Seong-ho
    COMPUTER STANDARDS & INTERFACES, 2011, 33 (04) : 432 - 437
  • [30] One-server private information retrieval scheme combined with mutual authentication by ElGamal signature
    Chen, Chun-Hua
    Jan, Jinn-Ke
    Hsu, Chao-Hsing
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 300 - +