Cryptanalysis of Chang et al.'s signature scheme with message recovery

被引:6
|
作者
Zhang, FG [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; message recovery; message redundancy schemes; one-way hash functions; forgery attack;
D O I
10.1109/LCOMM.2005.04014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Chang et al. [1] proposed a new digital signature scheme with message recovery and claimed that neither one-way hash functions nor message redundancy schemes were employed in their scheme. However, in this letter, two forgery attacks are proposed to show that Chang et al.'s signature scheme is not secure. To resist these attacks, the message redundancy schemes may still be used.
引用
收藏
页码:358 / 359
页数:2
相关论文
共 50 条
  • [41] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [42] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    International Journal of Network Security, 2007, 5 (02) : 220 - 223
  • [43] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    Information Systems Frontiers, 2013, 15 : 133 - 139
  • [44] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
  • [45] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [46] Attack on libert et al.'s ID-based undeniable signature scheme
    Department of Information Security, Beijing Eelctronic Science and Technology Institute, Beijing 100070, China
    不详
    不详
    Chin J Electron, 2008, 4 (748-750):
  • [47] Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
    Institute of Systems Science, Academy of Mathematics and System Sciences, Chinese Academy of Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    不详
    Int. J. Netw. Secur., 2006, 1 (69-72):
  • [48] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [49] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [50] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 748 - 750