Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme

被引:0
|
作者
Dou, Bennian [1 ]
Zhang, Hong [2 ]
Chen, Chun-Hua [3 ]
Xu, Chungen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Jiangsu, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210094, Jiangsu, Peoples R China
[3] Chien Kuo Technol Univ, Dept Comp & Commun, Changhua 500, Taiwan
关键词
verifiably encrypted signature scheme; rogue-key attack; proofs of possession; AGGREGATE;
D O I
10.1587/transfun.E96.A.242
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt' 2006, Lu et al. proposed a pairing based verifiably encrypted signature scheme (the LOSSW-VES scheme) without random oracles. In this letter, we show that the LOSSW-VES scheme does not have opacity against rogue-key attacks.
引用
收藏
页码:242 / 243
页数:2
相关论文
共 50 条
  • [41] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [42] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [43] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    [J]. Information Systems Frontiers, 2013, 15 : 133 - 139
  • [44] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    [J]. INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [45] Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
    Institute of Systems Science, Academy of Mathematics and System Sciences, Chinese Academy of Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    不详
    [J]. Int. J. Netw. Secur, 2006, 1 (69-72):
  • [46] Attack on libert et al.'s ID-based undeniable signature scheme
    Department of Information Security, Beijing Eelctronic Science and Technology Institute, Beijing 100070, China
    不详
    不详
    [J]. Chin J Electron, 2008, 4 (748-750):
  • [47] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [48] Lattice-Based Encrypted Verifiably Encryption Signature Scheme for the Fair and Private Electronic Commence
    Wang, Fenghe
    Shi, Shaoquan
    [J]. IEEE ACCESS, 2019, 7 : 147481 - 147489
  • [49] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782
  • [50] Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof
    Lee, Ji-Seon
    Chang, Jik Hyun
    Lee, Dong Hoon
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (05) : 948 - 954