Cryptanalysis of Chang et al.'s signature scheme with message recovery

被引:6
|
作者
Zhang, FG [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou 510275, Peoples R China
基金
中国国家自然科学基金;
关键词
digital signature; message recovery; message redundancy schemes; one-way hash functions; forgery attack;
D O I
10.1109/LCOMM.2005.04014
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recently, Chang et al. [1] proposed a new digital signature scheme with message recovery and claimed that neither one-way hash functions nor message redundancy schemes were employed in their scheme. However, in this letter, two forgery attacks are proposed to show that Chang et al.'s signature scheme is not secure. To resist these attacks, the message redundancy schemes may still be used.
引用
收藏
页码:358 / 359
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [2] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [3] Weakness of Chang et al.'s digital multisignature scheme for obtaining a message
    Li, ZC
    Zhi, GZ
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (04) : 537 - 538
  • [4] Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery
    李子臣
    成军祥
    戴一奇
    [J]. Tsinghua Science and Technology, 2003, (02) : 198 - 200
  • [5] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [6] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [7] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [8] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    [J]. INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [9] Cryptanalysis and improvement of Q. Peng et al.'s PVSS scheme
    Biswas, Anindya Kumar
    Dasgupta, Mou
    Ray, Sangram
    [J]. CRYPTOLOGIA, 2024, 48 (04) : 291 - 304
  • [10] Attack on Chen et al.'s certificateless aggregate signature scheme
    Zhang, Jianhong
    Zhao, Xubing
    Mao, Jian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (01) : 54 - 59