Security Analysis of Liu-Li Digital Signature Scheme

被引:0
|
作者
Liu, Chenglian [1 ,4 ]
Zhang, Jianghong [2 ]
Deng, Shaoyi [3 ]
机构
[1] Univ London, Dept Math, London WC1E 7HU, England
[2] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[3] Henan Polytechn Univ, Dept Commun Engn, Henan Sheng, Peoples R China
[4] Fuqing Branch Fujian Normal Univ, Dept Math & Comp Sci, Fujian Province, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Forgery attack; Digital signature; Algebra structure; ONE-WAY HASH; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2008, Liu and Li proposed a digital signature scheme without using one-way hash function and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Liu-Li scheme is insecure. Then we give an improvement, this scheme is suitable for low power computation and mobile device.
引用
收藏
页码:63 / +
页数:2
相关论文
共 50 条
  • [1] Security Analysis of Liu-Zhang-Deng Digital Signature Scheme
    Liu, Chenglian
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 485 - 488
  • [2] Security of Analysis Liu's Signature Scheme
    Zhao, Shaoka
    Liu, Chenglian
    2012 INTERNATIONAL CONFERENCE ON FUTURE ELECTRICAL POWER AND ENERGY SYSTEM, PT A, 2012, 17 : 655 - 658
  • [3] Security Analysis of One Quantum Digital Signature Scheme
    Cao, Zhengjun
    Markowitch, Olivier
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1574 - 1576
  • [4] SECURITY OF XINMEI DIGITAL SIGNATURE SCHEME
    ALABBADI, M
    WICKER, SB
    ELECTRONICS LETTERS, 1992, 28 (09) : 890 - 891
  • [5] A Forward Security Digital Signature Scheme
    Zhao Lijiang
    Liu Yali
    2011 INTERNATIONAL CONFERENCE ON AEROSPACE ENGINEERING AND INFORMATION TECHNOLOGY (AEIT 2011), 2011, : 208 - 211
  • [6] Study on Treatment Techniques of the Red Sandstone Cutting Slope on Hunan Liu-Li Highway
    Wu, Chuan
    Zhang, Rui
    ADVANCES IN CIVIL ENGINEERING II, PTS 1-4, 2013, 256-259 : 1780 - 1784
  • [7] Analysis on a threshold digital signature scheme
    Deng, Suping
    Xu, Qiuliang
    2002, Shanghai Computer Society (28):
  • [8] Security Analysis of Boolean Algebra Based on Zhang-Wang Digital Signature Scheme
    Zheng, Jinbin
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 507 - 509
  • [9] Digital signature scheme research in the transmission of data in security way
    Chen, Xuesong
    Wang, Xiufang
    Han, Yuhua
    Wang, Haochang
    Zhang, Hongyan
    Proceedings of the First International Conference on Information and Management Sciences, 2002, 1 : 430 - 432
  • [10] Identity-Based Digital Signature Scheme with Forward Security
    Tang Lei
    Liu Yali
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 290 - 293