×
In this paper we show that those two schemes fail to meet the nonrepudiation requirement: with negligible amount of computation, a signature could be forged.
This Conference Proceeding Article is brought to you for free and open access by the School of Computing and. Information Systems at Institutional Knowledge ...
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures ; Hongjun Wu · Feng Bao · Robert H. Deng · DOI: 10.1007/3-540-44586-2_13 ...
In this paper we show that those two schemes fail to meet the nonrepudiation requirement: with negligible amount of computation, a signature could be forged.
At ISW'99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signa- ture scheme is claimed to be ...
Hongjun Wu, Feng Bao, Robert H. Deng : Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: ...
Apr 30, 2022 · Without public key encryption and only digital signatures you can't have privacy. But besides Lamport signatures (hash function based) nearly ...
Missing: Cryptanalysis Scheme
People also ask
In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is ...
Public-Key encryption from ID-Based encryption without one-time signature · Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Jan 24, 2014 · The card does symmetric cryptography only (symmetric encryption, MAC). · The card can compute digital signatures.