Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem

Ming Yung Ko, Tzone-Lih Hwang, CC Chang

Research output: Contribution to journalArticlepeer-review

Abstract

Two attacks are given here to show that the identity-based signature scheme proposed by Chang and Lin, based upon Rabin's public key cryptosystem, is not secure enough.

Original languageEnglish
Pages (from-to)674-676
Number of pages3
JournalComputer Communications
Volume17
Issue number9
DOIs
Publication statusPublished - 1994 Jan 1

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem'. Together they form a unique fingerprint.

Cite this