|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Key Substitution Attacks on Provably Secure Short Signature Schemes
Chik-How TAN
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E88-A
No.2
pp.611-612 Publication Date: 2005/02/01 Online ISSN:
DOI: 10.1093/ietfec/e88-a.2.611 Print ISSN: 0916-8508 Type of Manuscript: LETTER Category: Information Security Keyword: cryptography, key substitution attacks,
Full Text: PDF(59.8KB)>>
Summary:
Recently, Boneh et al. proposed provably secure short signature schemes in the standard model and in the random oracle model respectively. In this letter, we propose strong-key substitution attacks on these signature schemes. In one of the attacks, we show that an adversary can generate a new public key satisfying all legitimate signatures created by the legitimate signer.
|
|