Title :
Attacks on ID-based signature scheme based upon Rabin´s public key cryptosystem
Author :
Ko, Mhg-Yung ; Hwang, Tzonelih ; Chang, C.C.
Author_Institution :
Inst. of Inf. Eng. Nat. Cheng-Kung Univ., Tainan, Taiwan
Abstract :
Two attacks are given to show that the identity-based signature scheme proposed by C. C. Chang and C. H. Lin (1991) based upon Rabin´s public key cryptosystem is not secure enough. One of the attacks is based on the conspiracy of two users in the system while the other can be performed by anyone alone. It is shown that, in this second attack, the scheme can be broken by anyone (not necessarily a user in the system) who has the ability to observe the communications between the signer and the receiver
Keywords :
handwriting recognition; public key cryptography; ID-based signature scheme; Rabin´s public key cryptosystem; conspiracy; identity-based signature scheme; Handwriting recognition;
Conference_Titel :
Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
0-7803-1479-4
DOI :
10.1109/CCST.1993.386831