𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem

✍ Scribed by Ming-Yung Ko; Tzonelih Hwang; CC Chang


Publisher
Elsevier Science
Year
1994
Tongue
English
Weight
210 KB
Volume
17
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Clouds over a public key cryptosystem ba
✍ MarΔ±́a Isabel GonzΓ‘lez Vasco; Rainer Steinwandt πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 51 KB

We demonstrate that with the given specifications the Lyndon words based public key cryptosystem suggested by Siromoney and Mathew [Inform. Process. Lett. 35 (1990) 33-36] is susceptible to very simple ciphertext only attacks. Consequently, in the present form this system cannot be considered as suf

On the security of an identity based mul
✍ Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 208 KB

In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and secur

Forgery attacks on Kang et al.’s identit
✍ Ji-Seon Lee; Jik Hyun Chang; Dong Hoon Lee πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 199 KB

Recently, Kang et al. proposed a new identity-based strong designated verifier signature scheme (ID-SDVS) and identity-based designated verifier proxy signature scheme (ID-DVPS). They claimed that their schemes are unforgeable. However, we found out that their schemes are universally forgeable in th