Key Substitution Attacks on Some Provably Secure Signature Schemes (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Recently, Camenisch et al. and Fischlin proposed provably secure signature schemes in the standard models respectively. In this letter, we propose key substitution attacks on these two signature schemes. We show that an adversary can generate a valid public key corresponding to a legitimate signature.
- 一般社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
TAN Chik-How
School of Electrical & Electronic Engineering, Nanyang Technological University
-
Tan Chik-how
School Of Electrical & Electronic Engineering Nanyang Technological University
関連論文
- On Diffie-Hellman Problems in 3rd Order Shift Register(Discrete Mathematics and Its Applications)
- On the n-th Order Shift Register Based Discrete Logarithm
- Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees(Information Security)
- Key Substitution Attacks on Some Provably Secure Signature Schemes (Cryptography and Information Security)