6 research outputs found

    A new digital signature scheme with message recovery using hybrid problems

    Get PDF
    We present a new digital signature scheme with message recovery and its authenticated encryption based on elliptic curve discrete logarithm and quadratic residue. The main idea is to provide a higher level of security than all other techniques that use signatures with single hard problem including factoring, discrete logarithm, residuosity, or elliptic curves. The proposed digital signature schemes do not involve any modular exponentiation operations that leave no gap for attackers. The security analysis demonstrates the improved performance of the proposed schemes in comparison with existing techniques in terms of the ability to resist the most common attack

    Cryptanalysis and Modification of an Improved Self-Certified Digital Signature Scheme with Message Recovery

    Get PDF
    Digital signature plays a key role in bringing authenticity to cryptographic communications. A signature scheme with message recovery has two characteristics. The public key of the signer can be authenticated while verifying the signature, and the receiver is able to obtain the message. In 2013, Wu and Xu presented a self-certified digital signature scheme with message recovery by combining the two concepts of digital signature with message recovery and self-certified public key. They also claimed that their scheme provides provable security against man-in-the-middle attack, forgery attack, and message leakage. This paper first reviews the scheme of Wu and Xu, and then presents an insider forgery attack to this scheme. It will be shown that this scheme is not secure against insider forgery attack. A modification is proposed in order to overcome this weakness

    Security Analysis of Digital Signature Scheme with Message Recovery using Self-Certified Public Keys

    Get PDF
    Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-certified public keys. Their schemes have two fundamental properties. Only the intended receiver can recover the message while verifying the signature, and each user can use his own private key independently without system authority learning about it. This paper presents man-in-the-middle attacks to both Tseng and his colleagues authenticated encryption variants. It will be shown that these schemes are not secure against this attack

    Digital signature with message recovery using self-certified public keys and its variants

    No full text
    In this paper, we first adopt the concept of self-certified public keys to propose a new signature scheme with message recovery. The proposed scheme has two properties that the signer's public key can simultaneously be authenticated in verifying the signature, and the receiver also obtains the message. As compared with the certificate-based signature scheme with message recovery, the public space and the communication cost are reduced. Moreover, we also present two variants based on the proposed scheme. One is an authenticated encryption scheme that only allows a specified receiver to verify and recover the message. The other scheme is the authenticated encryption scheme with message linkages, which is used to transmit large message. (C) 2002 Published by Elsevier Science Inc

    Digital Signature with Message Recovery Using Self-certified Public Keys and Its Variants

    No full text
    [[abstract]]In this paper, we first adopt the concept of self-certified public keys to propose a new signature scheme with message recovery. The proposed scheme has two properties that the signer s public key can simultaneously be authenticated in verifying the signature, and the receiver also obtains the message. As compared with the certificate-based signature scheme with message recovery, the public space and the communication cost are reduced. Moreover, we also present two variants based on the proposed scheme. One is an authenticated encryption scheme that only allows a specified receiver to verify and recover the message. The other scheme is the authenticated encryption scheme with message linkages, which is used to transmit large message
    corecore