Abstract
Two attacks are given here to show that the identity-based signature scheme proposed by Chang and Lin, based upon Rabin's public key cryptosystem, is not secure enough.
| Original language | English |
|---|---|
| Pages (from-to) | 674-676 |
| Number of pages | 3 |
| Journal | Computer Communications |
| Volume | 17 |
| Issue number | 9 |
| DOIs | |
| Publication status | Published - 1994 Jan 1 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver