By Topic

Comment on a Digital Signature Scheme with Using Self-Certified Public Keys

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zhang Jianhong ; Coll. of Sci., North China Univ. of Technol., Beijing, China ; Chen Hua ; Gao Shengnan ; Geng Qin

Digital signature is an important cryptographical tool. In a digital signature with using self-certified public key, the verification signature and public key can be carried out in a logic step. Recently, Tseng et al proposed a digital signature schemes with using self-certified public key. Unfortunately, Shao showed that the scheme was insecure, and gives an improvement scheme. In this works, we analyze security of Shao scheme and his attack and show that the attack is not powerful and the improvement scheme can not resist middle-in-man attack. Namely, when an adversary controls the communication channel between the signer Ui and Uj, he can tamper's signature on the message M, which is sent to Uj, as his signature on the message M under the condition of not knowing the message M. This attack is very frightful over the internet transactions.

Published in:

Information Technology and Applications, 2009. IFITA '09. International Forum on  (Volume:3 )

Date of Conference:

15-17 May 2009