New Forgery Attack on Chang et al.'s signature scheme

被引:0
|
作者
Li, Kou [1 ]
Ming, Jin [1 ]
机构
[1] SiChuan Tianyi Coll, Informat Engn Dept, Chengdu, Peoples R China
关键词
Digital signature; forgery attack; cryptanalysis; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Chang proposed one new digital signature scheme with message recovery and claimed the scheme is secure without using one-way hash function and message recovery. Two forgery attacks have been proposed to show that attackers who have a valid signature can forge signatures that can be verified validly on any uncontrolled messages by Fu. This paper proposes one new forgery attack scheme, which means that Chang et al.'s signature scheme is not secure.
引用
收藏
页码:5 / 6
页数:2
相关论文
共 50 条
  • [31] Remark on Yu et al.'s Online/Offline signature scheme in CT-RSA 2008
    Ma Xiao-Long
    Wang Zhi-Wei
    Gu Li-Ze
    Yang Yi-xian
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 719 - 720
  • [32] Reducing Computations in Chang et al.'s on-line Electronic Check
    Zhou, Zhili
    Yang, Ching-Nung
    Chen, Chih-Fei
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 271 - 288
  • [33] New convertible undeniable signature scheme's and attack models
    Kobayashi, Y
    Nagata, H
    Saito, T
    Tsujii, S
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
  • [34] Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2111 - 2118
  • [35] Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification
    Mashhadi, Samaneh
    [J]. SCIENTIA IRANICA, 2012, 19 (03) : 674 - 679
  • [36] Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
    Zhang, FG
    Safavi-Naini, R
    Susilo, W
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1166 - 1169
  • [37] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [38] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [39] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4
  • [40] Analysis on traceability on Stadler et al.'s fair blind signature
    Lee, NY
    Sun, MK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (11) : 2901 - 2902