Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

被引:0
|
作者
Dou, Bennian [1 ]
Zhang, Hong [2 ]
Chen, Chun-Hua [3 ]
Xu, Chungen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210094, Jiangsu, Peoples R China
[3] Chien Kuo Technol Univ, Dept Comp & Commun, Changhua 500, Taiwan
关键词
verifiably encrypted signature scheme; rogue-key attack; proofs of possession; AGGREGATE;
D O I
10.1587/transfun.E96.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt' 2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [21] A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
    Liu, Pengtao
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 242 - 252
  • [22] Attacks and solutions of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATICA, 2005, 16 (02) : 285 - 294
  • [23] Attacks to Li et al.'s Billing Service User Authentication Scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767
  • [24] Comment on Saeednia et al.'s strong designated verifier signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 258 - 260
  • [25] Attacks and Solutions on the Quan et al.'s Smart Card Based Remote User Authentication with a Key Agreement Scheme
    Chen, Chien-ming
    Huang, Yanyu
    Deng, Xiaoting
    Xiang, Bin
    Wu, Tsu-yang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [26] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    [J]. INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [27] Lu et al. Reply
    Lu, Yu-Shan
    Li, Jian-Lin
    Wu, Chien-Te
    [J]. PHYSICAL REVIEW LETTERS, 2024, 132 (21)
  • [28] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    [J]. Information Systems Frontiers, 2013, 15 : 133 - 139
  • [29] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [30] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641