A chosen message attack on Demytko’s elliptic curve cryptosystem

被引:0
作者
Burton S. Kaliski
机构
[1] RSA Laboratories,
来源
Journal of Cryptology | 1997年 / 10卷
关键词
Elliptic curves; Chosen message attack; Demytko’s cryptosystem; Signature forgery;
D O I
暂无
中图分类号
学科分类号
摘要
One of the purported advantages of the elliptic curve cryptosystem proposed by Demytko in 1993 is resistance to signature forgery under a chosen message attack. Based on a similar result by Bleichenbacheret al. on the LUC cryptosystem, this purported advantage is shown not to hold.
引用
收藏
页码:71 / 72
页数:1
相关论文
共 22 条
  • [1] A chosen message attack on Demytko's elliptic curve cryptosystem
    Kaliski, BS
    JOURNAL OF CRYPTOLOGY, 1997, 10 (01) : 71 - 72
  • [2] An IND-CPA cryptosystem from Demytko's primitive
    Galindo, D
    Martín, S
    Morillo, P
    Villar, JL
    2003 IEEE INFORMATION THEORY WORKSHOP, PROCEEDINGS, 2003, : 167 - 170
  • [3] FPGA IMPLEMENTATION OF AN ELLIPTIC CURVE CRYPTOSYSTEM
    Hritcu, Daniel
    Radoi, Ionut
    PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 360 - 365
  • [4] A nonlinear elliptic curve cryptosystem based on matrices
    Climent, JJ
    Ferrández, F
    Vicent, JF
    Zamora, A
    APPLIED MATHEMATICS AND COMPUTATION, 2006, 174 (01) : 150 - 164
  • [5] = Chosen message attack against Mukherjee-Ganguly-Chaudhuri's message authentication scheme
    Lee, Mun-Kyu
    Hong, Dowon
    Kim, Dong Kyue
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 427 - +
  • [6] Reducing the Elliptic Curve Cryptosystem of Meyer-Müller to the Cryptosystem of Rabin-Williams
    Joye M.
    Quisquater J.-J.
    Designs, Codes and Cryptography, 1998, 14 (1) : 53 - 56
  • [7] Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
    Hashimoto, Yasufumi
    Ikematsu, Yasuhiko
    Takagi, Tsuyoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 3 - 18
  • [8] DESIGN OF FAST CRAMER-SHOUP SCHEME INTO ELLIPTIC CURVE CRYPTOSYSTEM
    Nourdine, Bacar
    Sow, Demba
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (02): : 169 - 184
  • [9] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604
  • [10] Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
    Sajjad, Anum
    Afzal, Mehreen
    Iqbal, Waseem
    Abbas, Haider
    Latif, Rabia
    Raza, Rana Aamir
    IEEE ACCESS, 2020, 8 : 139903 - 139917