Cryptanalysis of Chang et al.'s signature scheme with message recovery

被引:6
|
作者
Zhang, FG [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; message recovery; message redundancy schemes; one-way hash functions; forgery attack;
D O I
10.1109/LCOMM.2005.04014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Chang et al. [1] proposed a new digital signature scheme with message recovery and claimed that neither one-way hash functions nor message redundancy schemes were employed in their scheme. However, in this letter, two forgery attacks are proposed to show that Chang et al.'s signature scheme is not secure. To resist these attacks, the message redundancy schemes may still be used.
引用
收藏
页码:358 / 359
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [2] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [3] Weakness of Chang et al.'s digital multisignature scheme for obtaining a message
    Li, ZC
    Zhi, GZ
    CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (04): : 537 - 538
  • [4] Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery
    李子臣
    成军祥
    戴一奇
    Tsinghua Science and Technology, 2003, (02) : 198 - 200
  • [5] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [6] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [7] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [8] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [9] On the security of Yuan et al.'s undeniable signature scheme
    Zhao, Wei
    International Journal of Network Security, 2010, 11 (03) : 177 - 180
  • [10] Improvement of Li et al.'s proxy signature scheme
    Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of
    不详
    WSEAS Trans. Syst., 2006, 1 (305-311):