Another Attack on Tso's Short Signature Scheme Based on Bilinear Pairings

Abstract:

Article Preview

In 2009, R. Tso et al. proposed an efficient pairing-based short signature scheme which is provably secure in the Random Oracle Model. In this paper, we propose a new key substitution attack on Raylin Tso et al.’s short signature scheme. For a given message and the corresponding valid signature, the malicious attacker can generate a substituted public key. Everyone verifies the signature successfully with the malicious attacker’s substituted public key. Therefore, Raylin Tso et al.’s short signature scheme has a security flaw in the multi-user setting.

Info:

Periodical:

Edited by:

Helen Zhang and David Jin

Pages:

785-788

DOI:

10.4028/www.scientific.net/AMM.63-64.785

Citation:

F. Y. Kong et al., "Another Attack on Tso's Short Signature Scheme Based on Bilinear Pairings", Applied Mechanics and Materials, Vols. 63-64, pp. 785-788, 2011

Online since:

June 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.