A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES

被引:0
|
作者
Li Zichen Li Zhongxian Yang Yixian
机构
基金
中国国家自然科学基金;
关键词
Message recovery signature; Discrete logarithm; Forgery attack;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery attacks to (F1), (F2) and Nyberg-Rueppel’s signatures are presented.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 50 条
  • [41] A Forgery Attack on Leaked-State Authenticated Encryption
    Mao, Jieshen
    Mu, Daoguang
    Lai, Xuejia
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL, 2015, 20 : 128 - 131
  • [42] Bandwidth-efficient attribute-based key-insulated signatures with message recovery
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. INFORMATION SCIENCES, 2016, 369 : 648 - 673
  • [43] New state recovery attack on RC4
    Maximov, Alexander
    Khovratovich, Dmitry
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 297 - 316
  • [44] New Key Recovery Attack Based on Periodic Property
    Zou, Jian
    Zou, Hong-Kai
    Dong, Xiao-Yang
    Wu, Wen-Ling
    Luo, Yi-Yuan
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (09): : 4239 - 4255
  • [45] Skilled forgery detection in on-line signatures: A multimodal approach
    Namboodiri, AM
    Saini, S
    Lu, XG
    Jain, AK
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 505 - 511
  • [46] Synthetic Forgery Attack Against Continuous Keystroke Authentication Systems
    Sun, Yan
    Upadhyaya, Shambhu
    [J]. 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [47] Deep Learning-Based Forgery Attack on Document Images
    Zhao, Lin
    Chen, Changsheng
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2021, 30 : 7964 - 7979
  • [48] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [49] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [50] Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore
    Sabt, Mohamed
    Traore, Jacques
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 531 - 548