Sciweavers

IJNSEC
2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings

12 years 11 months ago
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
We first analyze the security of a short signature scheme without random oracles called ZCSM scheme and point out that it cannot support unforgeable under the chosen message and public key attacks. We also propose a new signature scheme without random oracle using bilinear pairing that is existentially unforgeable under a chosen message attack. The security of the proposed scheme depends on a complexity assumption called the k+1 square roots inverse assumption. The proposed scheme has the same signature length with the previous short signature scheme where it fixes the ZCSM scheme’s deficiency.
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li
Added 14 May 2011
Updated 14 May 2011
Type Journal
Year 2011
Where IJNSEC
Authors Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi
Comments (0)