Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem

Ming Yung Ko, Tzonelih Hwang, C. C. Chang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Two attacks are given here to show that the identity-based signature scheme proposed by Chang and Lin based upon Rabin's public key cryptosystem is not secure enough.

Original languageEnglish
Title of host publicationProc 1993 IEEE Int Carnahan Conf Secur Technol
PublisherPubl by IEEE
Pages28-31
Number of pages4
ISBN (Print)0780314808, 9780780314801
DOIs
Publication statusPublished - 1993
EventProceedings of the 1993 IEEE International Carnahan Conference on Security Technology - Ottawa, Ont, Can
Duration: 1993 Oct 131993 Oct 15

Publication series

NameProc 1993 IEEE Int Carnahan Conf Secur Technol

Other

OtherProceedings of the 1993 IEEE International Carnahan Conference on Security Technology
CityOttawa, Ont, Can
Period93-10-1393-10-15

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Attacks on ID-based signature scheme based upon Rabin's public key cryptosystem'. Together they form a unique fingerprint.

Cite this