Security Analysis of Liu-Li Digital Signature Scheme

被引:0
|
作者
Liu, Chenglian [1 ,4 ]
Zhang, Jianghong [2 ]
Deng, Shaoyi [3 ]
机构
[1] Univ London, Dept Math, London WC1E 7HU, England
[2] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[3] Henan Polytechn Univ, Dept Commun Engn, Henan Sheng, Peoples R China
[4] Fuqing Branch Fujian Normal Univ, Dept Math & Comp Sci, Fujian Province, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Forgery attack; Digital signature; Algebra structure; ONE-WAY HASH; CRYPTANALYSIS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2008, Liu and Li proposed a digital signature scheme without using one-way hash function and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Liu-Li scheme is insecure. Then we give an improvement, this scheme is suitable for low power computation and mobile device.
引用
收藏
页码:63 / +
页数:2
相关论文
共 50 条
  • [21] The security analysis of a threshold proxy quantum signature scheme
    Shi JianHong
    Zhang ShengLi
    Chang ZhengGang
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2013, 56 (03) : 519 - 523
  • [22] On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme
    Wang, GL
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 75 - 89
  • [23] Security analysis and improvement of an arbitrated quantum signature scheme
    Xin, Xiangjun
    He, Qianqian
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    OPTIK, 2019, 189 : 23 - 31
  • [24] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523
  • [25] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    Science China(Physics,Mechanics & Astronomy), 2013, Mechanics & Astronomy)2013 (03) : 519 - 523
  • [26] Security analysis of a homomorphic signature scheme for network coding
    Cheng, Chi
    Jiang, Tao
    Liu, Yining
    Zhang, Mingwu
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4053 - 4060
  • [27] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [28] A digital signature scheme based on general Chebyshev polynomialA digital signature scheme based on general Chebyshev polynomialS. Li et al.
    Shouliang Li
    Rudong Min
    Jilong Zhang
    Jiale Han
    Yulin Shen
    Zhen Yang
    Yi Yang
    The Journal of Supercomputing, 81 (4)
  • [29] On the security of a group signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1310 - 1314
  • [30] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968