Forgery attacks on digital signature schemes without using one-way hash and message redundancy.
Hung-Yu ChienPublished in: IEEE Commun. Lett. (2006)
Keyphrases
- chosen message
- signature scheme
- hash functions
- bilinear pairings
- standard model
- public key
- threshold signature scheme
- authentication scheme
- designated verifier
- provably secure
- digital signature scheme
- signcryption scheme
- group signature scheme
- diffie hellman
- digital signature
- secret key
- data structure
- blind signature
- private key
- public key cryptography
- ring signature
- identity based cryptography