Key Substitution Attacks on Provably Secure Short Signature Schemes

Chik-How TAN  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E88-A   No.2   pp.611-612
Publication Date: 2005/02/01
Online ISSN: 
DOI: 10.1093/ietfec/e88-a.2.611
Print ISSN: 0916-8508
Type of Manuscript: LETTER
Category: Information Security
Keyword: 
cryptography,  key substitution attacks,  

Full Text: PDF(59.8KB)>>
Buy this Article




Summary: 
Recently, Boneh et al. proposed provably secure short signature schemes in the standard model and in the random oracle model respectively. In this letter, we propose strong-key substitution attacks on these signature schemes. In one of the attacks, we show that an adversary can generate a new public key satisfying all legitimate signatures created by the legitimate signer.