Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement
نویسندگان
چکیده
We first give an analysis on Zhang et al.’s attack on a short signature scheme so called ZCSM scheme and point out their forgery attack is not correct one. Furthermore, we present a forgery attack under the chosen message and public key attacks on ZCSM scheme, in the sense of Zhang et al.’s attack. We also analyze Zhang et al.’s improved signature scheme suggested to resist their attacks and point out the proposed scheme, in fact, does not work properly.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملOn the Security of Two Group Signature Schemes with Forward Security
A group signature scheme allows a group member of a group to sign messages on behalf of the group anonymously. In case of dispute, a special entity of the group, group manager, can reveal the signer of a valid group signature. In 2005, Zhang et al. proposed a new group signature with forward security based on their earlier scheme in ICICS 2003. Recently, Zhou et al. proposed a dynamic group sig...
متن کاملImprovement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme
In 2006, Hui-Feng Huang and Chin-Chen Chang proposed a novel efficient threshold proxy signature scheme based on Schnorr's scheme. In their scheme, the original signer could know who generated the threshold proxy signature and the receiver could certify the actuality of the proxy group signers who made the proxy signature. However, their scheme had some security weaknesses. In this paper, by id...
متن کاملRemarks on Zhang-Kim's Key Authentication Scheme
Key authentication is very important in secret communications and data security. Lee et al. proposed a new public key authentication scheme for cryptosystems based on discrete logarithms in 2003. Recently, Zhang et al. pointed out that Lee et al.’s scheme was not secure and proposed an improvement on it. However, in this paper, we will demonstrate that a dishonest user can forge the public key ...
متن کاملOn the Security of a RSA-based Certificateless Signature Scheme
The certificatless cryptography has been studied widely since it could eliminate the need of certificates in the Public Key Infrastructure and solve the inherent key escrow problem in the identity-based cryptography. Recently, Zhang et al.’s proposed the first RSA-based certificateless signature scheme and demonstrated that their scheme is provably secure in the random oracle model. In this pap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2013