Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem
β Scribed by Ming-Yung Ko; Tzonelih Hwang; CC Chang
- Publisher
- Elsevier Science
- Year
- 1994
- Tongue
- English
- Weight
- 210 KB
- Volume
- 17
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
We demonstrate that with the given specifications the Lyndon words based public key cryptosystem suggested by Siromoney and Mathew [Inform. Process. Lett. 35 (1990) 33-36] is susceptible to very simple ciphertext only attacks. Consequently, in the present form this system cannot be considered as suf
In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and secur
Recently, Kang et al. proposed a new identity-based strong designated verifier signature scheme (ID-SDVS) and identity-based designated verifier proxy signature scheme (ID-DVPS). They claimed that their schemes are unforgeable. However, we found out that their schemes are universally forgeable in th