Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

被引:0
|
作者
Dou, Bennian [1 ]
Zhang, Hong [2 ]
Chen, Chun-Hua [3 ]
Xu, Chungen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210094, Jiangsu, Peoples R China
[3] Chien Kuo Technol Univ, Dept Comp & Commun, Changhua 500, Taiwan
关键词
verifiably encrypted signature scheme; rogue-key attack; proofs of possession; AGGREGATE;
D O I
10.1587/transfun.E96.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt' 2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [31] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [32] An attack on libert et al.'s ID-based undeniable signature scheme
    Li, Zichen
    Chong, C.F.
    Hui, Lucas Chi-Kwong
    Yiu, Siu-Ming
    Chow, K.P.
    Tsang, Wai-Wan
    Chan, H.W.
    Pun, Kelvin K. H
    [J]. International Journal of Network Security, 2007, 5 (02) : 220 - 223
  • [33] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
  • [34] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    [J]. INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [35] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [36] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [37] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [38] Lattice-Based Encrypted Verifiably Encryption Signature Scheme for the Fair and Private Electronic Commence
    Wang, Fenghe
    Shi, Shaoquan
    [J]. IEEE ACCESS, 2019, 7 : 147481 - 147489
  • [39] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [40] Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (05) : 948 - 954