New Forgery Attack on Chang et al.'s signature scheme

被引:0
|
作者
Li, Kou [1 ]
Ming, Jin [1 ]
机构
[1] SiChuan Tianyi Coll, Informat Engn Dept, Chengdu, Peoples R China
关键词
Digital signature; forgery attack; cryptanalysis; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Chang proposed one new digital signature scheme with message recovery and claimed the scheme is secure without using one-way hash function and message recovery. Two forgery attacks have been proposed to show that attackers who have a valid signature can forge signatures that can be verified validly on any uncontrolled messages by Fu. This paper proposes one new forgery attack scheme, which means that Chang et al.'s signature scheme is not secure.
引用
收藏
页码:5 / 6
页数:2
相关论文
共 50 条
  • [41] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    [J]. COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [42] Chang et al. Respond to Allergies and ALL: Biology or Bias?
    Chang, Jeffrey S.
    Tsai, Yi-Wen
    Tsai, Chia-Rung
    Wiemels, Joseph L.
    [J]. AMERICAN JOURNAL OF EPIDEMIOLOGY, 2012, 176 (11) : 984 - 985
  • [43] Chang et al. Respond to "Environmental Exposures and Preterm Birth"
    Chang, Howard H.
    Reich, Brian J.
    Miranda, Marie Lynn
    [J]. AMERICAN JOURNAL OF EPIDEMIOLOGY, 2012, 175 (02) : 111 - 112
  • [44] Universal forgery on Sekhar's signature scheme with message recovery
    Laguillaumie, F
    Traoré, J
    Vergnaud, D
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2004, 81 (12) : 1493 - 1495
  • [45] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [47] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [48] Author's response to Sanchez et al. entitled "On the importance of training aids and the definition of an explosive odor signature: Commentary on Kranz et al.''
    Kranz, William
    Goodpaster, John
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2015, 251 : E20 - E21
  • [49] Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
    Bao, HY
    Cao, ZF
    Wang, SB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1419 - 1430
  • [50] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129