New Forgery Attack on Chang et al.'s signature scheme

被引:0
|
作者
Li, Kou [1 ]
Ming, Jin [1 ]
机构
[1] SiChuan Tianyi Coll, Informat Engn Dept, Chengdu, Peoples R China
关键词
Digital signature; forgery attack; cryptanalysis; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Chang proposed one new digital signature scheme with message recovery and claimed the scheme is secure without using one-way hash function and message recovery. Two forgery attacks have been proposed to show that attackers who have a valid signature can forge signatures that can be verified validly on any uncontrolled messages by Fu. This paper proposes one new forgery attack scheme, which means that Chang et al.'s signature scheme is not secure.
引用
收藏
页码:5 / 6
页数:2
相关论文
共 50 条
  • [21] Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 242 - 243
  • [22] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
    Hu, Jiang-hong
    Huang, Mei-juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
  • [23] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification
    Hwang Shinjia
    Hsu Teysu
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
  • [24] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    [J]. INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [25] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
    Park, Chanhyeok
    Cho, Sangrae
    Cho, Young-Seob
    Kim, Soohyung
    Lee, Hyung Tae
    [J]. IEEE ACCESS, 2024, 12 : 16462 - 16473
  • [26] Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes
    Wu, LC
    Yeh, YS
    Liu, TS
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (02) : 176 - 179
  • [27] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [28] Forgery Attack to Kang-Tang Digital Signature Scheme
    Fang, Jie
    Guo, Yongning
    Liu, Chenglian
    [J]. INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 471 - 474
  • [29] Smart-card-loss-attack and Improvement of Hsiang et al.'s Authentication Scheme
    Lee, Y. C.
    [J]. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 597 - 603
  • [30] Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
    Xie, Q
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 776 - 782