skip to main content
article

Enhancement of digital signature with message recovery using self-certified public keys and its variants

Published: 01 July 2005 Publication History

Abstract

In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one is that the signer's public key can simultaneously be authenticated in verifying the signature and the other one is that only the specified verifier can recover the message. Lately, Xie and YU proposed an attack to the Tseng et al.'s scheme under the cases: the specified verifier substitutes his secret key or two or more specified verifiers cooperatively forge the signer's signature. About the same time, Shao also proposed another insider forgery attack to break the Tseng et al.'s scheme. In addition, he claimed the Tseng et al.'s scheme without the properties of non-repudiation and forward security. Therefore, he proposed an improved scheme to overcome the weakness. In this paper, we will show that the Shao's improved scheme is still insecure against the insider forgery attack. A specified verifier can forge many different valid signatures with the same message to the other verifiers who cooperatively provide their secret keys. Furthermore, we give a small modification to overcome this weakness.

References

[1]
K. Nyberg, R. A. Rueppel, Message recovery for signature schemes based on the discrete logarithm, Designs, Codes Cryptography 7 (1996) 61--81.
[2]
P. Horster, M. Michels, H. Peterson, Authenticated encryption scheme with low communication costs, Electronics Letters 30 (15) (1994) 1212.
[3]
Y. M. Tseng, J. K. Jan, An efficient authenticated encryption scheme with message linkages and low communication costs, J. Inform. Sci. Engrg. 18 (1) (2002) 41--46.
[4]
Y. M. Tseng, J. K. Jan, H. Y. Chien, Authenticated encryption scheme with message linkages for message flows, Computers and Electrical Engineering, accepted and to appear.
[5]
T. S. Wu, C. L. Hsu, Convertible authenticated encryption scheme, The Journal of System and Software 62 (2002) 205--209.
[6]
Y. M. Tseng, J. K. Jan, H. Y. Chien, Digital signature with message recovery using self-certified public keys and its variants, Applied Mathematics and Computation 136 (2003) 203--214.
[7]
Q. Xie, X. Y. YU, Cryptanalysis of Tseng et al.'s authenticated encryption schemes, Applied Mathematics and Computation 158 (2004) 1--5.
[8]
Z. Shao, Improvement of digital signature with message recovery using self-certified public keys and its variants, Applied Mathematics and Computation 159 (2004) 391--399.
[9]
W. Diffee, M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22 (6) (1976) 644--654.
[10]
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory 31 (4) (1985) 469--472.
[11]
R. L. Rivest, A. Shamir, L. Adelman, A method for obtaining digital signature and public key cryptosystem, Comm. ACM 21 (2) (1978) 120--126.

Cited By

View all
  • (2007)An Authenticated Encryption Scheme for Securely Signing a Signature with Message LinkagesProceedings of the Second International Conference on Innovative Computing, Informatio and Control10.1109/ICICIC.2007.131Online publication date: 5-Sep-2007

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 39, Issue 3
July 2005
93 pages
ISSN:0163-5980
DOI:10.1145/1075395
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2005
Published in SIGOPS Volume 39, Issue 3

Check for updates

Author Tags

  1. authenticated encryption
  2. forward secrecy
  3. self-certified public key

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2007)An Authenticated Encryption Scheme for Securely Signing a Signature with Message LinkagesProceedings of the Second International Conference on Innovative Computing, Informatio and Control10.1109/ICICIC.2007.131Online publication date: 5-Sep-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media