Security Analysis of Concast and Anycast Digital Signature

Article Preview

Abstract:

In the above paper a conception has been proposed which is a variant of the ElGamal-type digital signature. It considers the problem of authentication in the concast and anycast communication model. This paper proposed an improvement of concast scheme and also given a forgery attack on the anycast scheme. The authors state signature scenario scheme as follows.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1177-1182

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Al-Ibrahim, H. Ghodosi, and J. Pieprzyk: Authentication of Concast Communication. INDOCRYPT'02 (2002) , p.185–198.

DOI: 10.1007/3-540-36231-2_16

Google Scholar

[2] M. Al-Ibrahim and A. Cerny: Authentication of Anycast Communication. Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS) (2003), p.419–423.

DOI: 10.1007/978-3-540-45215-7_36

Google Scholar

[3] Kan Zhang: Threshold Proxy Signature Schemes. Information Security Workshop (1997), p.191–197.

Google Scholar

[4] K. U. M. Mambo and E. Okamoto: Proxy Signature: Delegation of the Power to Sign Message. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E79-A:9 (1996), p.1338–1354.

Google Scholar

[5] D. R. Stinson: Attack on a concast signature scheme. Information Processing Letters Vol. 91:1(2004), p.39–41.

DOI: 10.1016/j.ipl.2003.12.010

Google Scholar

[6] Wikipedia. Anycast scheme. Wikipedia website (2010). http://en.wikipedia.org/wiki/Anycast.

Google Scholar

[7] C. Liu: Improvement of Authentication of Anycast Communication. The International Conference for Internet Technology and Secured Transactions (ICITST) 2009, p.1–3.

DOI: 10.1109/icitst.2009.5402618

Google Scholar

[8] Concast. http://protocols.netlab.uky.edu/~mullins/acast/concast.html. 07/21/2011.

Google Scholar