A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES

被引:0
|
作者
Li Zichen Li Zhongxian Yang Yixian
机构
基金
中国国家自然科学基金;
关键词
Message recovery signature; Discrete logarithm; Forgery attack;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 50 条
  • [31] NEW ARBITRATED QUANTUM SIGNATURE WITH MESSAGE RECOVERY
    Zhang, J.
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (06) : 1543 - 1551
  • [32] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY - REPLY
    PIVETEAU, JM
    [J]. ELECTRONICS LETTERS, 1994, 30 (11) : 852 - 852
  • [33] A Practical Forgery Attack on Lilliput-AE
    Dunkelman, Orr
    Keller, Nathan
    Lambooij, Eran
    Sasaki, Yu
    [J]. Journal of Cryptology, 2020, 33 (03): : 910 - 916
  • [34] Generalized forgery attack to optical encryption systems
    Feng, Jun
    Huang, Wei
    Jiao, Shuming
    Wang, Xiaopeng
    [J]. OPTICS EXPRESS, 2021, 29 (26) : 43580 - 43597
  • [35] A MAC forgery attack on SOBER-128
    Watanabe, D
    Furuya, S
    [J]. FAST SOFTWARE ENCRYPTION, 2004, 3017 : 472 - 482
  • [36] Certificateless message recovery signatures providing Girault's level-3 security
    Tso R.-L.
    Kim C.
    Yi X.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 577 - 585
  • [37] Certificateless Message Recovery Signatures Providing Girault's Level-3 Security
    左瑞麟
    KIM Cheonshik
    易训
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 577 - 585
  • [38] Attack recognition based on kernel attack signatures
    Krings, AW
    Harrison, WS
    Hanebutte, N
    Taylor, CA
    McQueen, M
    [J]. ISE'2001: PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INFORMATION SYSTEMS AND ENGINEERING, 2001, : 413 - 419
  • [39] Group public key encryption with equality test against offline message recovery attack
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Li, Ximing
    Ling, Yunzhi
    [J]. INFORMATION SCIENCES, 2020, 510 : 16 - 32
  • [40] Proof-of-Forgery for Hash-based Signatures
    Kiktenko, Evgeniy
    Kudinov, Mikhail
    Bulychev, Andrey
    Fedorov, Aleksey
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 333 - 342