Insecure primitive elements in an ElGamal signature protocol

被引:1
|
作者
Khadir, Omar [1 ]
机构
[1] Fstm Univ Hassan II Casablanca, Lab Math Cryptog & Mech, Casablanca, Morocco
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2015年 / 18卷 / 03期
关键词
ElGamal signature scheme; public key cryptography; cryptanalysis;
D O I
10.1080/09720529.2014.927648
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Consider the classical ElGamal digital signature scheme based on the modular relation alpha(m) = y(r) r(s)[p]. In this work, we prove that if we can compute a natural integer i such that alpha(i) mod p is smooth and divides p - 1, then it is possible to sign any given document without knowing the secret key. Therefore we extend and reinforce Bleichenbacher's attack presented at Eurocrypt'96.
引用
收藏
页码:237 / 245
页数:9
相关论文
共 50 条
  • [1] A novel deniable authentication protocol using generalized ElGamal signature scheme
    Lee, Wei-Bin
    Wu, Chia-Chun
    Tsaur, Woei-Jiunn
    INFORMATION SCIENCES, 2007, 177 (06) : 1376 - 1381
  • [2] Efficient deniable authentication protocol based on generalized ElGamal signature scheme
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 449 - 454
  • [3] On Elgamal signature scheme
    Kuo, Wen-Chung
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [4] Ring signature based on ElGamal signature
    Ren, Jian
    Harn, Lein
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 445 - 456
  • [5] A blind signature scheme based on ElGamal signature
    Mohammed, E
    Emarah, AE
    El-Shennawy, K
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 51 - 53
  • [6] On the Uniformity of Distribution of the ElGamal Signature
    Igor E. Shparlinski
    Applicable Algebra in Engineering, Communication and Computing, 2002, 13 : 9 - 16
  • [7] On the uniformity of distribution of the ElGamal signature
    Shparlinski, IE
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2002, 13 (01) : 9 - 16
  • [8] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [9] Why textbook ElGamal and RSA encryption are insecure - (Extended abstract)
    Boneh, D
    Joux, A
    Nguyen, PQ
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 30 - 43
  • [10] Threshold signature schemes for ElGamal variants
    Kim, Sungwook
    Kim, Jihye
    Cheon, Jung Hee
    Ju, Seong-ho
    COMPUTER STANDARDS & INTERFACES, 2011, 33 (04) : 432 - 437