Security analysis on a blind signature scheme based on Elgamal signature equation

被引:0
|
作者
Yu Eaozheng [1 ]
Xu Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, Hefei 230009, Anhui, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Universal forgery attacks and selected forgery attacks on both weak and strong blind signature schemes based on Elgamal signature equation proposed by Wang et al. are developed. Without using any secret key, anyone can forge a valid signature through selecting some random parameters. The possibility of forging the blind schemes is analyzed and moreover an improved weak blind signature scheme and an improved strong blind signature scheme are designed. Also, the securities of the improved blind signatures are analyzed.
引用
收藏
页码:741 / 744
页数:4
相关论文
共 50 条
  • [1] A blind signature scheme based on ElGamal signature
    Mohammed, E
    Emarah, AE
    El-Shennawy, K
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 51 - 53
  • [2] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [3] Cryptanalysis of a blind signature scheme based on the ELGamal signatures
    School of Management, Hefei University of Technology, Hefei 230009, China
    Zhongshan Daxue Xuebao, 2006, SUPPL. (38-40):
  • [4] On Elgamal signature scheme
    Kuo, Wen-Chung
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [5] Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP
    Yang, Xuan
    Yu, Zhaoping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4732 - 4735
  • [6] ElGamal signature scheme immune to fault analysis
    Nikodem, Maciej
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 355 - 362
  • [7] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [8] On the security of the ElGamal-type signature scheme with small parameters
    Kuwakado, H
    Tanaka, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 93 - 97
  • [9] Security of proxy blind signature scheme
    Zhang, Jianhong
    Cui, Yuanbo
    Chen, Zhipeng
    Information Technology Journal, 2013, 12 (03) : 466 - 469
  • [10] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456