Cryptanalysis of Chang et al.'s signature scheme with message recovery

被引:6
|
作者
Zhang, FG [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; message recovery; message redundancy schemes; one-way hash functions; forgery attack;
D O I
10.1109/LCOMM.2005.04014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Chang et al. [1] proposed a new digital signature scheme with message recovery and claimed that neither one-way hash functions nor message redundancy schemes were employed in their scheme. However, in this letter, two forgery attacks are proposed to show that Chang et al.'s signature scheme is not secure. To resist these attacks, the message redundancy schemes may still be used.
引用
收藏
页码:358 / 359
页数:2
相关论文
共 50 条
  • [21] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [22] Cryptanalysis of some signature schemes with message recovery
    Zhang, ZF
    Feng, DG
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 103 - 114
  • [23] Cryptanalysis of Nyberg-Rueppel's message recovery scheme
    Lin, CC
    Laih, CS
    IEEE COMMUNICATIONS LETTERS, 2000, 4 (07) : 231 - 232
  • [24] Cryptanalysis of Huang-Chang partially blind signature scheme
    Zhang, FG
    Chen, XF
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) : 323 - 325
  • [25] On the security of Miyaji et al. group signature scheme
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 1373 - 1382
  • [26] In Reply to Chang et al.
    Gouveia, Andre G.
    Viani, Gustavo A.
    Moraes, Fabio Y.
    INTERNATIONAL JOURNAL OF RADIATION ONCOLOGY BIOLOGY PHYSICS, 2023, 115 (01): : 248 - 249
  • [27] Chang et al. reply
    Chang A.J.
    Kim N.S.
    Hireed H.
    de Arce A.D.
    Ortega F.E.
    Riegler J.
    Madison D.V.
    Krasnow M.A.
    Nature, 2018, 561 (7724) : E41 - E41
  • [28] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [29] Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
    Zhang, Z
    Araki, S
    Xiao, GZ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1475 - 1483
  • [30] Security analysis of choi et al.'s certificateless short signature scheme
    Chen, Yu-Chi
    Tso, Raylin
    Horng, Gwoboa
    Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154