Cryptanalysis of Chang et al.'s signature scheme with message recovery

被引:6
|
作者
Zhang, FG [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; message recovery; message redundancy schemes; one-way hash functions; forgery attack;
D O I
10.1109/LCOMM.2005.04014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Chang et al. [1] proposed a new digital signature scheme with message recovery and claimed that neither one-way hash functions nor message redundancy schemes were employed in their scheme. However, in this letter, two forgery attacks are proposed to show that Chang et al.'s signature scheme is not secure. To resist these attacks, the message redundancy schemes may still be used.
引用
收藏
页码:358 / 359
页数:2
相关论文
共 50 条
  • [31] Comments on the security flaw of hwang et al.'s blind signature scheme
    Department of Accounting and Information, The Overseas Chinese Institute of Technology, Taiwan
    不详
    不详
    Int. J. Netw. Secur., 2008, 2 (185-189):
  • [32] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [33] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [34] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [35] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [36] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ali, Sajid
    Kumari, Saru
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
  • [37] Cryptanalysis on Cheng et al. Protocol
    Thakur, Tejeshwari
    INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS (ICMSS2016), 2016, 1739
  • [38] Cryptanalysis of Farash et al.'s SIP authentication protocol
    Azrour, Mourade
    Farhaoui, Yousef
    Ouanan, Mohammed
    INTERNATIONAL JOURNAL OF DYNAMICAL SYSTEMS AND DIFFERENTIAL EQUATIONS, 2018, 8 (1-2) : 77 - 94
  • [39] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [40] Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 242 - 243