首页 | 本学科首页   官方微博 | 高级检索  
     

Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery
引用本文:李子臣,成军祥,戴一奇. Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery[J]. 清华大学学报, 2003, 8(2)
作者姓名:李子臣  成军祥  戴一奇
作者单位:Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China,Department of Mathematics,Jiaozuo Institute of Technology,Jiaozuo 454159,China,Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China Department of Computer Science and Technology,Jiaozuo Institute of Technology,Jiaozuo 454159,China
基金项目:Supported by the National Natural Science Foundation of China(No.90104032)
摘    要:Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. This paper analyzes the security of the Piveteau scheme by designing some attacks. Two improved methods to Piveteau signature scheme and Nyberg-Rueppel schemes were developed to avoid these weaknesses. Analyses of the security of the improved schemes prove that the improved methods can effectively handle the attacks proposed in this paper.


Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery
LI Zichen,CHENG Junxiang,DAI Yiqi. Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery[J]. Tsinghua Science and Technology, 2003, 8(2)
Authors:LI Zichen  CHENG Junxiang  DAI Yiqi
Affiliation:LI Zichen,CHENG Junxiang,DAI Yiqi Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China, Department of Computer Science and Technology,Jiaozuo Institute of Technology,Jiaozuo 454159,China, Department of Mathematics,Jiaozuo Institute of Technology,Jiaozuo 454159,China
Abstract:Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. This paper analyzes the security of the Piveteau scheme by designing some attacks. Two improved methods to Piveteau signature scheme and Nyberg-Rueppel schemes were developed to avoid these weaknesses. Analyses of the security of the improved schemes prove that the improved methods can effectively handle the attacks proposed in this paper.
Keywords:digital signature  message recovery  cryptanalysis  cryptography
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号