Forgery attack on a signature scheme with message recovery

被引:0
|
作者
Yu, Baozheng [1 ]
Xu, Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, 193 Tunxi Rd, Hefei 230009, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, M. Sekhar gave a digital signature scheme with message recovery, where only a specific verifier can directly check the validity of the signature. A third party can distinguish a valid signature through a zero-knowledge proof protocol. However we find that the proposed scheme is insecure. A forgery attack strategy on M. Sekhar's scheme has been designed,- anyone who has a valid signature can forge a signature on an arbitrary message. An improved signature scheme, which can resist the forgery attack and a zero-knowledge proofprotocol with which a third party can distinguish a valid signature are presented. Also,the security of the improved scheme is analyzed.
引用
收藏
页码:904 / +
页数:2
相关论文
共 50 条
  • [21] Designated Verifier Strong Blind Signature Scheme with Message Recovery
    He, Junjie
    Sun, Fang
    Qi, Chuanda
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 169 - 172
  • [22] A Pairing-based Blind Signature Scheme with Message Recovery
    Han, Song
    Chang, Elizabeth
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 303 - 308
  • [23] Formal security proofs for a signature scheme with partial message recovery
    Brown, DRL
    Johnson, DB
    [J]. TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 126 - 142
  • [24] Message recovery signature scheme using complementary elliptic curves
    Yew, TC
    Haili, HK
    Sumari, P
    [J]. 2003 INTERNATIONAL CONFERENCE ON GEOMETRIC MODELING AND GRAPHICS, PROCEEDINGS, 2003, : 106 - 110
  • [25] Signature with message recovery
    Chen, KF
    [J]. ELECTRONICS LETTERS, 1998, 34 (20) : 1934 - 1934
  • [26] New digital signature scheme attaining immunity to adaptive chosen message attack
    Zhu, HF
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (04) : 484 - 486
  • [27] An Extension to Modified Ham Digital Signature Scheme with the Feature of Message Recovery
    Tripathi, Shailendra Kumar
    Gupta, Bhupendra
    [J]. NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 183 - 193
  • [28] Efficient message recovery proxy blind signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (11):
  • [29] An Improved ID-based Proxy Signature Scheme with Message Recovery
    Zhou, Caixue
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 151 - 163
  • [30] ECDLP-based certificateless proxy signature scheme with message recovery
    Padhye, Sahadeo
    Tiwari, Namita
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (03): : 346 - 354