Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem

被引:2
|
作者
Yang, Jen-Ho [1 ]
Chang, Chin-Chen
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, 160 San Hsing, Chiayi 621, Taiwan
关键词
D O I
10.1109/ISDA.2008.8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete logarithm problem (ECDLP). However, we find that their scheme has a security flaw, and thus we propose a feasible attack on Chung et al.'s scheme in this paper. The proposed attack is based on the technique for solving the linear Diophantine equation. Using the proposed technique, an attacker can easily obtain the signer's secret key without facing the difficulty of ECDLP. Therefore, Chung et al. 's scheme cannot prevent from our attack such that it is not secure.
引用
收藏
页码:3 / +
页数:2
相关论文
共 50 条
  • [41] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873
  • [42] An efficient hierarchical ID-Based signature scheme
    Yu, J
    Li, DX
    Hao, R
    Proceedings of the 11th Joint International Computer Conference, 2005, : 92 - 95
  • [43] Efficient ID-based certificateless signature scheme
    Key Laboratory of Computer Network and Information Security, Xidian University, Xi'an 710071, China
    Tongxin Xuebao, 2008, 2 (87-94):
  • [44] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [45] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [46] ID-based, Proxy, Threshold Signature Scheme
    Pomykala, Jacek
    Kulakowski, Henryk
    Sapiecha, Piotr
    Grela, Blazej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (02) : 201 - 205
  • [47] An ID-based multi-signature scheme
    Meng, Tao
    Zhang, Xinping
    Sun, Shenghe
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 115 - 117
  • [48] ID-based digital multisignature scheme
    Tang, SH
    Wei, G
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 1999, 9 (3-4) : 223 - 227
  • [49] Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 206 - 221
  • [50] A new digital signature scheme on ID-based key-sharing infrastructures
    Nishioka, T
    Hanaoka, G
    Imai, H
    INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270