Security Analysis of Liu-Li Digital Signature Scheme

被引:0
|
作者
Liu, Chenglian [1 ,4 ]
Zhang, Jianghong [2 ]
Deng, Shaoyi [3 ]
机构
[1] Univ London, Dept Math, London WC1E 7HU, England
[2] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[3] Henan Polytechn Univ, Dept Commun Engn, Henan Sheng, Peoples R China
[4] Fuqing Branch Fujian Normal Univ, Dept Math & Comp Sci, Fujian Province, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Forgery attack; Digital signature; Algebra structure; ONE-WAY HASH; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2008, Liu and Li proposed a digital signature scheme without using one-way hash function and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Liu-Li scheme is insecure. Then we give an improvement, this scheme is suitable for low power computation and mobile device.
引用
收藏
页码:63 / +
页数:2
相关论文
共 50 条
  • [11] Security of digital signature scheme based on factoring and discrete logarithms
    Chang, CC
    Chang, YF
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 331 - 332
  • [12] Digital multi-signature scheme and its security proof
    Wang, Xiao-Feng
    Zhang, Jing
    Wang, Shang-Ping
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (01): : 176 - 183
  • [13] Security analysis of a security-enhanced certificateless signature scheme
    Yang, Xiaodong
    Wang, Jinli
    Chen, Chunlin
    Li, Ting
    Wang, Meiding
    Wang, Caifen
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2029 - 2033
  • [14] Security Analysis of Concast and Anycast Digital Signature
    Liu, Chenglian
    Guo, Yongning
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 1177 - 1182
  • [15] Security analysis on a blind signature scheme based on Elgamal signature equation
    Yu Eaozheng
    Xu Congwei
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 741 - 744
  • [16] Fault analysis of the NTRUSign digital signature scheme
    Abdel Alim Kamal
    Amr M. Youssef
    Cryptography and Communications, 2012, 4 : 131 - 144
  • [17] Fault analysis of the NTRUSign digital signature scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (02): : 131 - 144
  • [18] Security Analysis of Li-Li mixture XOR Scheme
    Zhao, Liang
    Liu, Chenglian
    Chen, Sonia C-, I
    INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2019, 2020, 2293
  • [19] Security of a new digital signature scheme based on factoring and discrete logarithms
    Shao, Z
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2005, 82 (10) : 1215 - 1219
  • [20] A NOVEL DIGITAL SIGNATURE SCHEME BASED ON CUBIC RESIDUE WITH PROVABLE SECURITY
    Lin, Hsiu-Feng
    Gun, Chiou-Yueh
    Chen, Chih-Ying
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (3A): : 1645 - 1663