Forgery attack on a signature scheme with message recovery

被引:0
|
作者
Yu, Baozheng [1 ]
Xu, Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, 193 Tunxi Rd, Hefei 230009, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, M. Sekhar gave a digital signature scheme with message recovery, where only a specific verifier can directly check the validity of the signature. A third party can distinguish a valid signature through a zero-knowledge proof protocol. However we find that the proposed scheme is insecure. A forgery attack strategy on M. Sekhar's scheme has been designed,- anyone who has a valid signature can forge a signature on an arbitrary message. An improved signature scheme, which can resist the forgery attack and a zero-knowledge proofprotocol with which a third party can distinguish a valid signature are presented. Also,the security of the improved scheme is analyzed.
引用
收藏
页码:904 / +
页数:2
相关论文
共 50 条
  • [31] Efficient identity-based signature scheme with partial message recovery
    Li, Yong
    Chen, Huiyan
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 883 - +
  • [32] A source authentication scheme based on message recovery digital signature for multicast
    Yang, Jen-Ho
    Lin, Iuon-Chang
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2616 - 2627
  • [33] Cryptanalysis of an ID-based proxy signature scheme with message recovery
    Tian, M.
    Huang, L.
    Yang, W.
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
  • [34] Attack on a concast signature scheme
    Stinson, DR
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 39 - 41
  • [35] Signature Correction Attack on Dilithium Signature Scheme
    Islam, Saad
    Mus, Koksal
    Singh, Richa
    Schaumont, Patrick
    Sunar, Berk
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 647 - 663
  • [36] Signature with message recovery - Comment
    Mitchell, CJ
    Yeun, CY
    [J]. ELECTRONICS LETTERS, 1999, 35 (03) : 217 - 217
  • [37] An improved and provable self-certified digital signature scheme with message recovery
    Wu, Fan
    Xu, Lili
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 344 - 357
  • [38] Identity-based signature scheme with partial message recovery in the standard model
    Liu, Zhen-Hua
    Zhang, Xiang-Song
    Tian, Xu-An
    Hu, Yu-Pu
    [J]. Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 654 - 658
  • [39] Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
    James, Salome
    Gayathri, N. B.
    Reddy, P. Vasudeva
    [J]. CRYPTOGRAPHY, 2018, 2 (04) : 1 - 14
  • [40] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359