Another Attack on Tso's Short Signature Scheme Based on Bilinear Pairings
2011 ◽
Vol 63-64
◽
pp. 785-788
Keyword(s):
In 2009, R. Tso et al. proposed an efficient pairing-based short signature scheme which is provably secure in the Random Oracle Model. In this paper, we propose a new key substitution attack on Raylin Tso et al.’s short signature scheme. For a given message and the corresponding valid signature, the malicious attacker can generate a substituted public key. Everyone verifies the signature successfully with the malicious attacker’s substituted public key. Therefore, Raylin Tso et al.’s short signature scheme has a security flaw in the multi-user setting.
2013 ◽
Vol 380-384
◽
pp. 2435-2438
◽
Keyword(s):
2010 ◽
Vol 439-440
◽
pp. 1271-1276
◽
Keyword(s):
2014 ◽
Vol 2014
◽
pp. 1-6
◽
2011 ◽
Vol 282-283
◽
pp. 307-311
2013 ◽
Vol 457-458
◽
pp. 1262-1265
2010 ◽
Vol 439-440
◽
pp. 1265-1270
◽
Keyword(s):
2016 ◽
Vol 9
(17)
◽
pp. 4060-4074
◽
Keyword(s):
2013 ◽
Vol 411-414
◽
pp. 721-724
◽
Keyword(s):