Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem

被引:2
作者
Yang, Jen-Ho [1 ]
Chang, Chin-Chen
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, 160 San Hsing, Chiayi 621, Taiwan
来源
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ISDA.2008.8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete logarithm problem (ECDLP). However, we find that their scheme has a security flaw, and thus we propose a feasible attack on Chung et al.'s scheme in this paper. The proposed attack is based on the technique for solving the linear Diophantine equation. Using the proposed technique, an attacker can easily obtain the signer's secret key without facing the difficulty of ECDLP. Therefore, Chung et al. 's scheme cannot prevent from our attack such that it is not secure.
引用
收藏
页码:3 / +
页数:2
相关论文
共 9 条
[1]   ID-based digital signature scheme on the elliptic curve cryptosystem [J].
Chung, Yu Fang ;
Huang, Kuo Hsuan ;
Lai, Feipei ;
Chen, Tzer Shyong .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) :601-604
[2]  
Dickson L. E., 1992, HIST THEORY NUMBERS, VII
[3]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[4]  
Gathen Joachim Von Zur, 2003, Modern Computer Algebra
[5]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[6]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[7]  
Mordell L. J., 1969, Diophantine Equations
[8]   Knowledge-proof based versatile smart card verification protocol [J].
Nyang, DH ;
Song, JS .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (03) :39-44
[9]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017