Key substitution attacks on some provably secure signature schemes

被引:0
作者
Tan, CH [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 2263, Singapore
关键词
cryptography; key substitution attacks;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Camenisch et al. and Fischlin proposed provably secure signature schemes in the standard models respectively. In this letter, we propose key substitution attacks on these two signature schemes. We show that an adversary can generate a valid public key corresponding to a legitimate signature.
引用
收藏
页码:226 / 227
页数:2
相关论文
共 8 条
[1]  
Baek J, 2000, IEICE T FUND ELECTR, VE83A, P2766
[2]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1560, P154
[3]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
[4]  
Fischlin M, 2003, LECT NOTES COMPUT SC, V2567, P116
[5]   Public key signatures in the multi-user setting [J].
Galbraith, S ;
Malone-Lee, J ;
Smart, NP .
INFORMATION PROCESSING LETTERS, 2002, 83 (05) :263-266
[6]  
Gennaro R, 1999, LECT NOTES COMPUT SC, V1592, P123
[7]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[8]  
MENEZES A, SECURITY SIGNATURE S