透過您的圖書館登入
IP:18.222.69.152
  • 期刊

On the Security of Signature Scheme with Message Recovery and Its Application

並列摘要


In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature scheme with non-repudiation of origin and a convertible designated verifier signature scheme with non-repudiation of origin. This paper, however, presents a security analysis where Sekhar’s signature schemes are vulnerable to some forgery attacks. This means that any attacker can forge a signature for any message.

被引用紀錄


Chen, T. J. (2012). 適用於癲癇偵測之高功率效益生理訊號處理系統晶片之設計與實現 [doctoral dissertation, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2012.01062
許博宇(2011)。適用於Mobile RFID環境下之離線委任轉移協定〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201101023
Cheng, L. F. (2013). 應用於早期預防心因性猝死之系統演算法及架構設計 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2013.00511

延伸閱讀