Key Substitution Attacks on Some Provably Secure Signature Schemes

Chik-How TAN  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E87-A   No.1   pp.226-227
Publication Date: 2004/01/01
Online ISSN: 
DOI: 
Print ISSN: 0916-8508
Type of Manuscript: Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptography,  key substitution attacks,  

Full Text: PDF(107.8KB)>>
Buy this Article




Summary: 
Recently, Camenisch et al. and Fischlin proposed provably secure signature schemes in the standard models respectively. In this letter, we propose key substitution attacks on these two signature schemes. We show that an adversary can generate a valid public key corresponding to a legitimate signature.