Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete logarithm problem is hard to solve. Two schemes (the ID-type and the random-type schemes) based on the linear scheme for th...
Saved in:
Main Authors: | WU, Hongjun, BAO, Feng, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2001
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1105 https://ink.library.smu.edu.sg/context/sis_research/article/2104/viewcontent/Wu2001_CryptanalysisOfADigitalSignature_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Cryptanalysis of Polynomial Authentication and Signature Scheme
by: WU, Hongjun, et al.
Published: (2000) -
A Secure Extension of the Kwak-Moon Group Signcryption Scheme
by: KWAK, D., et al.
Published: (2006) -
(Strong) multidesignated verifiers signatures secure against rogue key attack
by: ZHANG, Yunmei, et al.
Published: (2012) -
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
by: Chen, J., et al.
Published: (2021) -
Efficient discrete logarithm based multi-signature scheme in the plain public key model
by: MA, Changshe, et al.
Published: (2010)