Forgery Attack to Kang-Tang Digital Signature Scheme

被引:0
|
作者
Fang, Jie [1 ]
Guo, Yongning [1 ]
Liu, Chenglian [2 ]
机构
[1] Fujian Normal Univ, Fuqing Branch, Dept Math & Comp Sci, Fuqing 350300, Peoples R China
[2] Long Yan Univ, Sch Math & Comp Sci, Longyan 364012, Peoples R China
基金
中国国家自然科学基金;
关键词
Forgery attack; Digital signature; Algebra structure; CRYPTANALYSIS;
D O I
10.1063/1.4897775
中图分类号
O59 [应用物理学];
学科分类号
摘要
In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.
引用
收藏
页码:471 / 474
页数:4
相关论文
共 50 条
  • [1] Forgery attack on a signature scheme with message recovery
    Yu, Baozheng
    Xu, Congwei
    [J]. 2006 ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2006, : 904 - +
  • [2] Universal Forgery Attack on a Strong Designated Verifier Signature Scheme
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (05) : 425 - 428
  • [3] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
  • [4] Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2111 - 2118
  • [5] Attack on a concast signature scheme
    Stinson, DR
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 39 - 41
  • [6] Signature Correction Attack on Dilithium Signature Scheme
    Islam, Saad
    Mus, Koksal
    Singh, Richa
    Schaumont, Patrick
    Sunar, Berk
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 647 - 663
  • [7] Forgery-Resilience for Digital Signature Schemes
    Mashatan, Atefeh
    Ouafi, Khaled
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [8] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [9] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [10] Improving the security of arbitrated quantum signature against the forgery attack
    Zhang, Ke-Jia
    Zhang, Wei-Wei
    Li, Dan
    [J]. QUANTUM INFORMATION PROCESSING, 2013, 12 (08) : 2655 - 2669