Attack on Okamoto et al.'s New Short Signature Schemes
نویسندگان
چکیده
We present an attack on a new short signature scheme from bilinear pairing proposed by Okamoto et al. at ITCC’05. We show that any one can derive the secret key of the signer from any two messagesignature pairs and so can forge the signer’s signature for any message. This means the scheme is totally broken.
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAn Efficient ID-based Digital Signature with Message Recovery Based on Pairing
Signature schemes with message recovery have been wildly investigated a decade ago in the literature, but the first ID-based signature with message recovery goes out into the world until 2005. In this paper, we first point out and revise one little but important problem which occurs in the previous ID-based signature with message recovery scheme. Then, by completely different setting, we propos...
متن کاملCryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Sun’s nonrepudiation threshold proxy signature scheme is not secure against the collusion attack. In order to guard against the attack, Hwang et al. proposed another threshold proxy signature scheme. However, a new attack is proposed to work on both Hwang et al.’s and Sun’s schemes. By executing this attack, one proxy signer and the original signer can forge any valid proxy signature. Therefore...
متن کاملAnalysis of Sun et al.'s linkability attack on some proxy blind signature schemes
The proxy blind signature scheme allows the designated proxy signer using the proxy secret key to generate a blind signature on behalf of the original signer. Tan et al. presented the DLP-based and ECDLP based blind signature schemes. Awasthi and Lal proposed a improved DLP-based scheme later. Recently, Sun et al. presented linkability attack on Tan et al. s and Awasthi–Lal s proxy blind signat...
متن کاملOriginal Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy signature schemes are vulnerable to an original signer’s forgery attack. In this attack, a malicious original signer can impersonate a proxy signer and produce a forged proxy signature on a message. A third party will in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005