You are looking at a specific version 20050313:141653 of this paper. See the latest version.

Paper 2005/038

Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants

Yi-Hwa Chen and Jinn-Ke Jan

Abstract

In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one is that the signer¡¦s public key can simultaneously be authenticated in verifying the signature and the other one is that only the specified verifier can recover the message. Lately, Xie and YU proposed an attack to the Tseng et al.¡¦s scheme under the cases: the specified verifier substitutes his secret key or two or more specified verifiers cooperatively forge the signer¡¦s signature. About the same time, Shao also proposed another insider forgery attack to break the Tseng et al.¡¦s scheme. In addition, he claimed the Tseng et al.¡¦s scheme without the properties of non-repudiation and forward security. Therefore, he proposed an improved scheme to overcome the weakness. In this paper, we will show that the Shao¡¦s improved scheme is still insecure against the insider forgery attack. A specified verifier can forge many different valid signatures with the same message to the other verifiers who cooperatively provide their secret keys. Furthermore, we give a small modification to overcome this weakness.

Metadata
Available format(s)
-- withdrawn --
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
cryptanalysisAuthenticated encryptionSignatureForward securityMessage linkageSelf-certificated public key
Contact author(s)
yh_chen @ seed net tw
History
2005-03-13: withdrawn
2005-02-16: received
See all versions
Short URL
https://ia.cr/2005/038
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.