Security analysis on a blind signature scheme based on Elgamal signature equation

被引:0
|
作者
Yu Eaozheng [1 ]
Xu Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, Hefei 230009, Anhui, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Universal forgery attacks and selected forgery attacks on both weak and strong blind signature schemes based on Elgamal signature equation proposed by Wang et al. are developed. Without using any secret key, anyone can forge a valid signature through selecting some random parameters. The possibility of forging the blind schemes is analyzed and moreover an improved weak blind signature scheme and an improved strong blind signature scheme are designed. Also, the securities of the improved blind signatures are analyzed.
引用
收藏
页码:741 / 744
页数:4
相关论文
共 50 条
  • [1] A blind signature scheme based on ElGamal signature
    Mohammed, E
    Emarah, AE
    El-Shennawy, K
    [J]. IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 51 - 53
  • [2] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [3] On Elgamal signature scheme
    Kuo, Wen-Chung
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [4] Security Analysis of a Proxy Blind Signature Scheme Based on ECDLP
    Yang, Xuan
    Yu, Zhaoping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4732 - 4735
  • [5] ElGamal signature scheme immune to fault analysis
    Nikodem, Maciej
    [J]. DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 355 - 362
  • [6] On the security of the ElGamal-type signature scheme with small parameters
    Kuwakado, H
    Tanaka, H
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 93 - 97
  • [7] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [8] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
  • [9] Fault cryptanalysis of ElGamal signature scheme
    Biernat, J
    Nikodem, M
    [J]. COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 327 - 336
  • [10] Cryptanalysis of the enhanced ElGamal's signature scheme
    Laih, CS
    Kuo, WC
    [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 228 - 231