Forgery attack on a signature scheme with message recovery

被引:0
|
作者
Yu, Baozheng [1 ]
Xu, Congwei [1 ]
机构
[1] Hefei Univ Technol, Sch Management, 193 Tunxi Rd, Hefei 230009, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, M. Sekhar gave a digital signature scheme with message recovery, where only a specific verifier can directly check the validity of the signature. A third party can distinguish a valid signature through a zero-knowledge proof protocol. However we find that the proposed scheme is insecure. A forgery attack strategy on M. Sekhar's scheme has been designed,- anyone who has a valid signature can forge a signature on an arbitrary message. An improved signature scheme, which can resist the forgery attack and a zero-knowledge proofprotocol with which a third party can distinguish a valid signature are presented. Also,the security of the improved scheme is analyzed.
引用
收藏
页码:904 / +
页数:2
相关论文
共 50 条
  • [41] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [42] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [43] Improving the security of arbitrated quantum signature against the forgery attack
    Zhang, Ke-Jia
    Zhang, Wei-Wei
    Li, Dan
    [J]. QUANTUM INFORMATION PROCESSING, 2013, 12 (08) : 2655 - 2669
  • [44] Improving the security of arbitrated quantum signature against the forgery attack
    Ke-Jia Zhang
    Wei-Wei Zhang
    Dan Li
    [J]. Quantum Information Processing, 2013, 12 : 2655 - 2669
  • [45] Forgery attack to an asymptotically optimal traitor tracing scheme
    Wu, Yongdong
    Bao, Feng
    Deng, Robert H.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 171 - +
  • [46] A REMARK ON A SIGNATURE SCHEME WHERE FORGERY CAN BE PROVED
    BLEUMER, G
    PFITZMANN, B
    WAIDNER, M
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 441 - 445
  • [47] An arbitrated quantum message signature scheme
    Lü, X
    Feng, DG
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 1054 - 1060
  • [48] Efficient identity-based blind message recovery signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    [J]. IET INFORMATION SECURITY, 2018, 12 (02) : 150 - 156
  • [49] A New Self-Certified Proxy Multi-Signature Scheme with Message Recovery
    Zuo Weiping
    Liu Yunfang
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 330 - 332
  • [50] Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery
    James, Salome
    Thumbur, Gowri
    Reddy, Vasudeva P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 117 - 137