Cryptanalysis on improved user efficient blind signatures - Electronics Letters
نویسندگان
چکیده
Discussion: We point out here that we have modified the original protocol [8] in signature signing and verification equations. Two recent attacks [IO, 111 on the original protocol cannot work successfully in this modified protocol. This modified protocol does not increase any computational load and the key agreement protocol does not involve any additional one-way hash function. The signatures, xA and x, satisfy the following equations as Z A = TA, k A , + TA, k~~ + S A mod p 1
منابع مشابه
Improved low - computation partially blind signatures q
A low-computation partially blind signature scheme was proposed in 1998. Compared to the existing blind signature protocols, the scheme largely reduces the computation costs for each user by about 99%. However, a weakness on partial blindness is found in the scheme. This paper presents a new partially blind signature protocol with extremely low computation for each user. Not only is the propose...
متن کاملCryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones
Partially blind signature scheme is a cryptographic primitive mainly used to design efficient and anonymous electronic cash systems. Due to this attractive application, some researchers have focused their interest on it. Cao, Lin and Xue recently proposed such a protocol based on RSA. In this paper we first show that this protocol does not meet the anonymous property since the bank is able to l...
متن کاملCryptanalysis of Lee-Hwang-Yang blind signature scheme
In 2005, Lee et al. proposed a blind signature scheme based on the discrete-logarithm problem to achieve the untraceability or unlinkability property. However, the scheme will be demonstrated as not being secure in this manuscript. We design an attack on the scheme such that a signature requester can obtain more than one valid signatures by performing only one round of the protocol. It violates...
متن کاملUser Efficient Fair Blind Signatures
In this paper we present a user efficient fair blind signature scheme where linkage of each signature can be recovered in case of illegal usage. A user has to compute only several modular additions and multiplications in our signing protocol, and hence it is very suitable for mobile commerce paradigm where customers use hand-held devices with limited computation power.
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009