Shao Zuhua. DISCUSSION ON SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 2000, 22(5): 858-864.
Citation:
Shao Zuhua. DISCUSSION ON SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 2000, 22(5): 858-864.
Shao Zuhua. DISCUSSION ON SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 2000, 22(5): 858-864.
Citation:
Shao Zuhua. DISCUSSION ON SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 2000, 22(5): 858-864.
Qi Ming and others recently analyzed and discussed the security of two kinds of the ElGamal signature schemes and the password authentication scheme based on two kinds of the signature schemes,and proposed two kinds of improved schemes.This paper first points out that the first p type signature scheme proposed by Qi is not secure,since attackers can forge signature for any message.Then this paper shows that the generalized ElGamal signature schemes can not resist the substitution attack.Finally this paper shows that two kinds of the improved schemes proposed by Qi can not resist the homomorphism attack,and does not have the security as Qi said.
祁明,肖国镇.两类ElGamal型数字签名方案的安全性和性能分析,电子科学学刊,1997,19(3):346-349.[2]Chang C C,Liao W Y.A remote password authentication scheme based upon ElGamals signature scheme,Computer and Security,1994,13(2):137-144.[3]Harn L,Xu Y.Design of generalized ElGamal type digital signature schemes based on the discrete logarithm,Electron.Lett.,1994,31(24):2025-2026.[4]Boyb C.New digital signature scheme based on discrete logarithm(comment),Electron.Lett.,1994,30(6):480-481.[5]Nyberg K.New digital signature scheme based on discrete logarithm(comment),Electron[J].Lett.1994,30(6):481-[6]祁明,肖国镇.加强广义ElGamal型签名方案的安全性,电子学报,1996,24(11):68-72.[7]He J,Keisler T.Enhancing the security of ElGamals signature scheme,IEE Proc[J].Comput.Digit.Tech.1994,141(4):249-252[8]Ham L.Enhancing the security of ElGamals signature scheme (comment),IEE Proc[J].Comput.Digit.Tech.1995,142(5):376-