Insecure primitive elements in an ElGamal signature protocol
نویسنده
چکیده
Consider the classical ElGamal digital signature scheme based on the modular relation α ≡ y r [p]. In this work, we prove that if we can compute a natural integer i such that α mod p is smooth and divides p − 1, then it is possible to sign any given document without knowing the secret key. Therefore we extend and reinforce Bleichenbacher’s attack presented at Eurocrypt’96.
منابع مشابه
Attack on a concast signature scheme
Al-Ibrahim, Ghodosi and Pieprzyk proposed several methods of batch signature verifiation suitable for concast communication. These schemes are all based on ElGamal-type signature schemes. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.
متن کاملEfficient deniable authentication protocol based on generalized ElGamal signature scheme
An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. The proposed protocol is based on the generalized ElGamal signature scheme and is more efficient than the previous protocols. We show that if an adversary could forge signatures of this protocol,...
متن کاملSchnorr Digital Signature in Signcryption Scheme
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...
متن کاملCombining Public Key Encryption with Schnorr Digital Signature
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...
متن کاملCapture Resilient ElGamal Signature Protocols
One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is insecure as long as the device is subject to capture. In this paper, we propose server-assisted protocols for the ElGamal signature scheme which make the system capture resilie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1509.01504 شماره
صفحات -
تاریخ انتشار 2015