|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Key Substitution Attacks on Some Provably Secure Signature Schemes
Chik-How TAN
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E87-A
No.1
pp.226-227 Publication Date: 2004/01/01 Online ISSN:
DOI: Print ISSN: 0916-8508 Type of Manuscript: Special Section LETTER (Special Section on Cryptography and Information Security) Category: Keyword: cryptography, key substitution attacks,
Full Text: PDF(107.8KB)>>
Summary:
Recently, Camenisch et al. and Fischlin proposed provably secure signature schemes in the standard models respectively. In this letter, we propose key substitution attacks on these two signature schemes. We show that an adversary can generate a valid public key corresponding to a legitimate signature.
|
|