Abstract | ||
---|---|---|
Chang et al. proposed a new digital signature scheme with message recovery. However, several forgery attacks demonstrated that Chang et al.'s construction without using one-way hash functions and message redundancy is insecure. Nevertheless, it is unclear to see how to achieve the attacks. In this paper, more general forgery attacks are described to show clearly how to obtain these attacks. It is interesting that our general forgery covers all the known attacks. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1504/IJICS.2015.069212 | International Journal of Information and Computer Security |
Field | DocType | Volume |
Message authentication code,Computer science,Computer security,Information security,Computer network,Digital signature,Redundancy (engineering),Security analysis,Hash function | Journal | 7 |
Issue | Citations | PageRank |
1 | 0 | 0.34 |
References | Authors | |
11 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lei Niu | 1 | 0 | 0.34 |
Changqing Zhang | 2 | 0 | 0.34 |
Qi Xia | 3 | 132 | 21.76 |
Yong Yu | 4 | 523 | 45.29 |