Security Analysis of Liu-Li Digital Signature Scheme

被引:0
|
作者
Liu, Chenglian [1 ,4 ]
Zhang, Jianghong [2 ]
Deng, Shaoyi [3 ]
机构
[1] Univ London, Dept Math, London WC1E 7HU, England
[2] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[3] Henan Polytechn Univ, Dept Commun Engn, Henan Sheng, Peoples R China
[4] Fuqing Branch Fujian Normal Univ, Dept Math & Comp Sci, Fujian Province, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Forgery attack; Digital signature; Algebra structure; ONE-WAY HASH; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2008, Liu and Li proposed a digital signature scheme without using one-way hash function and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Liu-Li scheme is insecure. Then we give an improvement, this scheme is suitable for low power computation and mobile device.
引用
收藏
页码:63 / +
页数:2
相关论文
共 50 条
  • [41] On the security of digital signature algorithm
    Liu, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 362 - 367
  • [42] On the security of the Digital Signature Algorithm
    Blake, IF
    Garefalakis, T
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 87 - 96
  • [43] A Signature Scheme for Digital Imagery
    Fisher, Paul S.
    Kwak, Min Gyung
    Lee, Eunjung
    Baek, Jinsuk
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [44] A new digital signature scheme
    Fahmy, AE
    Badawy, W
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 4, PROCEEDINGS, 2004, : 185 - 188
  • [45] Security Analysis on Digital Signature Function Implemented in PDF Software
    Park, Sunwoo
    Lee, Changbin
    Lee, Kwangwoo
    Kim, Jeeyeon
    Lee, Youngsook
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 327 - +
  • [46] On the security of a convertible group signature scheme
    Saeednia, S
    INFORMATION PROCESSING LETTERS, 2000, 73 (3-4) : 93 - 96
  • [47] Verified Security of BLT Signature Scheme
    Firsov, Denis
    Buldas, Ahto
    Truu, Ahto
    Laanoja, Risto
    CPP '20: PROCEEDINGS OF THE 9TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS, 2020, : 244 - 257
  • [48] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [49] The security flaw of an untraceable signature scheme
    Chang, CC
    Chang, YF
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1379 - 1381
  • [50] ENHANCING THE SECURITY OF ELGAMALS SIGNATURE SCHEME
    HARN, L
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 376 - 376