Paper Title:
Another Attack on Tso's Short Signature Scheme Based on Bilinear Pairings
  Abstract

In 2009, R. Tso et al. proposed an efficient pairing-based short signature scheme which is provably secure in the Random Oracle Model. In this paper, we propose a new key substitution attack on Raylin Tso et al.’s short signature scheme. For a given message and the corresponding valid signature, the malicious attacker can generate a substituted public key. Everyone verifies the signature successfully with the malicious attacker’s substituted public key. Therefore, Raylin Tso et al.’s short signature scheme has a security flaw in the multi-user setting.

  Info
Periodical
Edited by
Helen Zhang and David Jin
Pages
785-788
DOI
10.4028/www.scientific.net/AMM.63-64.785
Citation
F. Y. Kong, L. Wu, J. Yu, "Another Attack on Tso's Short Signature Scheme Based on Bilinear Pairings", Applied Mechanics and Materials, Vols. 63-64, pp. 785-788, 2011
Online since
June 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Jian Hong Zhang, Hua Chen, Yi Xian Yang
Abstract:As a special anonymous signature, the blindness of blind signatures makes it play an important role in electronic commerce. In this paper we...
1265
Authors: Cheng Yu Hu, Peng Tao Liu
Abstract:The ring signature can guarantee the signer’s anonymity. Most proposed ring signature schemes have two problems: One is that the size of ring...
2192
Authors: Hui Meng, Xu Qian
Chapter 2: Network & Control
Abstract:Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing...
217
Authors: Shivendu Mishra, Ritika Yaduvanshi, Anjani Kumar Rai, Nagendra Pratap Singh
Chapter 7: Machining
Abstract:In an ID-Based cryptosystem, identity of users are used to generate their public and private keys. In this system private key is generated by...
929
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914