Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

被引:0
|
作者
Dou, Bennian [1 ]
Zhang, Hong [2 ]
Chen, Chun-Hua [3 ]
Xu, Chungen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210094, Jiangsu, Peoples R China
[3] Chien Kuo Technol Univ, Dept Comp & Commun, Changhua 500, Taiwan
关键词
verifiably encrypted signature scheme; rogue-key attack; proofs of possession; AGGREGATE;
D O I
10.1587/transfun.E96.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt' 2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [11] An efficient ID-Based verifiably encrypted signature scheme based on Hess's scheme
    Kwon, Saeran
    Lee, Sang-Ho
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 93 - 104
  • [12] A novel verifiably encrypted signature scheme without random oracle
    Zhang, Jianhong
    Mao, Jian
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 65 - +
  • [13] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [14] Verifiably encrypted multi-signature scheme in the standard model
    [J]. Chen, C.-H. (godsons@ctu.edu.tw), 1847, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [16] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [17] Improvement of Li et al.'s proxy signature scheme
    Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of
    不详
    [J]. WSEAS Trans. Syst, 2006, 1 (305-311):
  • [18] Rogue-key attacks on the multi-designated verifiers signature scheme
    Shim, Kyung-Ah
    [J]. INFORMATION PROCESSING LETTERS, 2008, 107 (02) : 83 - 86
  • [19] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [20] Attack on Chen et al.'s certificateless aggregate signature scheme
    Zhang, Jianhong
    Zhao, Xubing
    Mao, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 54 - 59