Paper Title:
Key Substitution Attack and Malleability of a Short Signature Scheme with Batch Verification
  Abstract

At IWSEC 2008, F. Guo et al. proposed an efficient short signature scheme with batch verification based on C. Gentry’s scheme. In this paper, we firstly propose the key substitution attack on F. Guo et al.’s digital signature scheme and show that the malicious adversary can forge a valid signature, which can be verified with a substituted public key. Secondly, we prove that F. Guo et al.’s scheme is malleable and the attacker can produce a new valid signature on the message if he/she has known some valid signatures on the same message.

  Info
Periodical
Edited by
Qi Luo
Pages
1605-1608
DOI
10.4028/www.scientific.net/AMM.55-57.1605
Citation
F. Y. Kong, J. Yu, "Key Substitution Attack and Malleability of a Short Signature Scheme with Batch Verification", Applied Mechanics and Materials, Vols. 55-57, pp. 1605-1608, 2011
Online since
May 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Cun Yi Zhang, Mu Qing Wu, Run Qian Chen, Guo Dong Ma
Chapter 2: Electronics and Communication
Abstract:This paper proposes a novel greedy user ordering algorithm for the multiuser multiple-input multiple-output (MIMO) systems employing block...
270
Authors: Huei Ru Tseng
Chapter 12: Computer and Information Technologies
Abstract:The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by...
3380
Authors: Yi Ying Zhang, Wei Fu Zou, Su Xiang Zhang, Ben Wang
Chapter 5: Sensors, Measurements and Monitoring
Abstract:Smart substations are deployed various types of sensors to monitor and control some devices and environment, and transmit the related...
248
Authors: Hao Li, Cheng Yang, Jia Yin Tian
Chapter 8: Communications and Applied Information Technologies
Abstract:Nowadays, with the development of hardware platform, digital content can be presented in more varieties of forms. The authorized users not...
815