Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem

被引:2
|
作者
Yang, Jen-Ho [1 ]
Chang, Chin-Chen
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, 160 San Hsing, Chiayi 621, Taiwan
关键词
D O I
10.1109/ISDA.2008.8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete logarithm problem (ECDLP). However, we find that their scheme has a security flaw, and thus we propose a feasible attack on Chung et al.'s scheme in this paper. The proposed attack is based on the technique for solving the linear Diophantine equation. Using the proposed technique, an attacker can easily obtain the signer's secret key without facing the difficulty of ECDLP. Therefore, Chung et al. 's scheme cannot prevent from our attack such that it is not secure.
引用
收藏
页码:3 / +
页数:2
相关论文
共 50 条
  • [1] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [2] ID-based group-oriented cryptosystem and its digital signature scheme
    Wu, TC
    Su, RL
    COMPUTER COMMUNICATIONS, 1997, 20 (11) : 1019 - 1026
  • [3] Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystem
    Liu, CL
    Horng, G
    Liu, HY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2171 - 2172
  • [4] Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures
    Wu, HJ
    Bao, F
    Deng, RH
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 173 - 179
  • [5] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
  • [6] Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem
    Long, Tao
    Liu, Xiaoxia
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 104 - 107
  • [7] Digital multi-signature scheme based on the Elliptic Curve cryptosystem
    Tzer-Shyong Chen
    Kuo-Hsuan Huang
    Yu-Fang Chung
    Journal of Computer Science and Technology, 2004, 19 : 570 - 573
  • [8] Digital multi-signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 570 - IBC
  • [9] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [10] Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
    Duo Liu
    Ping Luo
    Yi-Qi Dai
    Journal of Computer Science and Technology, 2007, 22 : 92 - 94