Paper Title:
Forgery Attack to Authentication of Anycast Communication
  Abstract

Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.

  Info
Periodical
Edited by
Qi Luo
Pages
2483-2486
DOI
10.4028/www.scientific.net/AMM.58-60.2483
Citation
J. S. Zhan, C. L. Liu, "Forgery Attack to Authentication of Anycast Communication", Applied Mechanics and Materials, Vols. 58-60, pp. 2483-2486, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Qi Xia, Chun Xiang Xu, Yong Yu
Abstract:Liu et al. proposed the first certificateless signature scheme without random oracles in 2007. However, Xiong et al. showed that Liu et al.'s...
1606
Authors: Cheng Lian Liu, Yong Ning Guo
Chapter 2: Advanced Design Science (2)
Abstract:In the above paper a conception has been proposed which is a variant of the ElGamal-type digital signature. It considers the problem of...
1177
Authors: Xiao Yu Miao, Guang Guo Han
XI. Computational Science Technology, Algorithms
Abstract:In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well as a proxy-protected version. They claimed...
3604
Authors: Li Min Sha
Chapter 9: E-Commerce, E-Government, Internet Technologies
Abstract:In this paper, the proxy blind multi-signature scheme proposed by Hu was analyzed, and we show that the scheme is not secure against the...
1198