Elsevier

Computer Communications

Volume 17, Issue 9, September 1994, Pages 674-676
Computer Communications

Research notes
Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem

https://doi.org/10.1016/0140-3664(94)90094-9Get rights and content

Abstract

Two attacks are given here to show that the identity-based signature scheme proposed by Chang and Lin, based upon Rabin's public key cryptosystem, is not secure enough.

References (10)

  • GJ Simmons

    Contemporary Cryptology

    (1992)
  • RL Rivest et al.

    A method for obtaining digital signatures and public-key cryptosystems

    Commun. ACM

    (1978)
  • T El Gamal

    A public key cryptosystem and a signature scheme based on discrete logarithms

    IEEE Trans. Infor. Theory

    (1985)
  • A Shamir

    Identity based cryptosystems and signature schemes

  • S Goldwasser et al.

    The knowledge complexity of interactive proof systems

    SIAM J. Comput.

    (1989)
There are more references available in the full text version of this article.

Cited by (0)

View full text