New Forgery Attack on Chang et al.'s signature scheme

被引:0
|
作者
Li, Kou [1 ]
Ming, Jin [1 ]
机构
[1] SiChuan Tianyi Coll, Informat Engn Dept, Chengdu, Peoples R China
关键词
Digital signature; forgery attack; cryptanalysis; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Chang proposed one new digital signature scheme with message recovery and claimed the scheme is secure without using one-way hash function and message recovery. Two forgery attacks have been proposed to show that attackers who have a valid signature can forge signatures that can be verified validly on any uncontrolled messages by Fu. This paper proposes one new forgery attack scheme, which means that Chang et al.'s signature scheme is not secure.
引用
收藏
页码:5 / 6
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [2] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359
  • [3] Attack on Chen et al.'s certificateless aggregate signature scheme
    Zhang, Jianhong
    Zhao, Xubing
    Mao, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 54 - 59
  • [4] A universal forgery on Araki et al.'s convertible limited verifier signature scheme
    Zhang, FG
    Kim, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
  • [5] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme
    Li Zichen
    Yan Yunsheng
    Zhang Juanmei
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04) : 748 - 750
  • [6] Universal Forgery on Shen et al.'s Linkable and Convertible ID-based Ring Signature Scheme
    Hwang, Shin-Jia
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2201 - 2204
  • [7] Weakness of Chang et al.'s digital multisignature scheme for obtaining a message
    Li, ZC
    Zhi, GZ
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (04) : 537 - 538
  • [8] Traceability on Stadler et al.'s fair blind signature scheme
    Hwang, MS
    Lee, CC
    Lai, YC
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02) : 513 - 514
  • [9] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [10] Forgery attack on a signature scheme with message recovery
    Yu, Baozheng
    Xu, Congwei
    [J]. 2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 904 - +