Forgery attack on a signature scheme with message recovery

被引:0
|
作者
Yu, Baozheng [1 ]
Xu, Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, 193 Tunxi Rd, Hefei 230009, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, M. Sekhar gave a digital signature scheme with message recovery, where only a specific verifier can directly check the validity of the signature. A third party can distinguish a valid signature through a zero-knowledge proof protocol. However we find that the proposed scheme is insecure. A forgery attack strategy on M. Sekhar's scheme has been designed,- anyone who has a valid signature can forge a signature on an arbitrary message. An improved signature scheme, which can resist the forgery attack and a zero-knowledge proofprotocol with which a third party can distinguish a valid signature are presented. Also,the security of the improved scheme is analyzed.
引用
收藏
页码:904 / +
页数:2
相关论文
共 50 条
  • [1] Universal forgery on Sekhar's signature scheme with message recovery
    Laguillaumie, F
    Traoré, J
    Vergnaud, D
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2004, 81 (12) : 1493 - 1495
  • [2] A NEW FORGERY ATTACK ON MESSAGE RECOVERY SIGNATURES
    Li Zichen Li Zhongxian Yang Yixian
    [J]. Journal of Electronics(China), 2000, (03) : 234 - 237
  • [3] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY
    PIVETEAU, JM
    [J]. ELECTRONICS LETTERS, 1993, 29 (25) : 2185 - 2185
  • [4] A Timestamped Signature Scheme with Message Recovery
    Mohanty, Sujata
    Kumar, Pothuri Bhanu Sai Pavan
    Hanok, Kodavatikanti
    [J]. 2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [5] Quantum signature scheme with message recovery
    Wang, J
    Zhang, Q
    Tang, CJ
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1375 - U1378
  • [6] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [7] Forgery Attack to Kang-Tang Digital Signature Scheme
    Fang, Jie
    Guo, Yongning
    Liu, Chenglian
    [J]. INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 471 - 474
  • [8] Signature scheme with message recovery and its application
    Sekhar, MR
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2004, 81 (03) : 285 - 289
  • [9] NEW SIGNATURE SCHEME WITH MESSAGE RECOVERY - REPLY
    PIVETEAU, JM
    [J]. ELECTRONICS LETTERS, 1994, 30 (11) : 852 - 852
  • [10] Arbitrated quantum signature scheme with message recovery
    Lee, H
    Hong, CH
    Kim, H
    Lim, J
    Yang, HJ
    [J]. PHYSICS LETTERS A, 2004, 321 (5-6) : 295 - 300