{"title":"伪造电子签名及确定密钥的方法","authors":"Jingmei Liu, Xiangguo Cheng, Xinmei Wang","doi":"10.1109/AINA.2006.227","DOIUrl":null,"url":null,"abstract":"We present a new method to forge ElGamal signatures with the cases that the secret key parameters of the system are not known under the chosen signature messages. The attacker can forge the signature substituting the right signature, and also attack the right secret key without depending on the computation of discrete logarithm. With the attacking probability cryptanalysis, it is found that the cryptosystem can be attacked successfully in some conditions","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Methods to Forge ElGamal Signatures and Determine Secret Key\",\"authors\":\"Jingmei Liu, Xiangguo Cheng, Xinmei Wang\",\"doi\":\"10.1109/AINA.2006.227\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a new method to forge ElGamal signatures with the cases that the secret key parameters of the system are not known under the chosen signature messages. The attacker can forge the signature substituting the right signature, and also attack the right secret key without depending on the computation of discrete logarithm. With the attacking probability cryptanalysis, it is found that the cryptosystem can be attacked successfully in some conditions\",\"PeriodicalId\":185969,\"journal\":{\"name\":\"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AINA.2006.227\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2006.227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Methods to Forge ElGamal Signatures and Determine Secret Key
We present a new method to forge ElGamal signatures with the cases that the secret key parameters of the system are not known under the chosen signature messages. The attacker can forge the signature substituting the right signature, and also attack the right secret key without depending on the computation of discrete logarithm. With the attacking probability cryptanalysis, it is found that the cryptosystem can be attacked successfully in some conditions