Qi Ming, Xiao Guozhen. SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 1997, 19(3): 346-349.
Citation:
Qi Ming, Xiao Guozhen. SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 1997, 19(3): 346-349.
Qi Ming, Xiao Guozhen. SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 1997, 19(3): 346-349.
Citation:
Qi Ming, Xiao Guozhen. SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES[J]. Journal of Electronics & Information Technology, 1997, 19(3): 346-349.
The security relationship between p-schemes and MR(p)-schemes is analysed and their security classes are given. In addition, some multisignature schemes based on MR(p)-schemes and some password authentication schemes based on unproved ElGamal signature schemes are proposed. The results may be helpful for new understanding of the security, performance and relationship of two kinds of ElGamal type signature schemes.
Nyberg K, Rueppel R A. Message recovery for signature schemes based on the discrete logarithm problem, Proc. of Eurocryrd94, London: 1994, 175-189.[2]Chang C C, Lao W Y. A remote password authentication based on E1Gama1s signature scheme, Computer and Security, 1994, 13(2): 137-144.[3]E1Gamal T. A public key cryptosystem and signature scheme based on discrete logarithm, IEEE Trans. on IT, 1985, IT-31(4): 469-472.[4]Yen S M, Laih C S. New digital signature scheme based on discrete logarithm, Electron. Lett., 1993, 29(12): 1120-1121.[5]Nyberg K. Comment: New digital signature scheme based on discrete logarithm, Electron[J].Lett.1994, 30(6):481-[6]He J.[J].Kiesler T. Enhancing the security of E1Gama1s signature scheme. IEE Proc.-E.1994,:-