2004
DOI: 10.1016/j.ipl.2003.12.010
|View full text |Cite
|
Sign up to set email alerts
|

Attack on a concast signature scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Stinson [5] proposed a forgery attack where any user can forge a signature that could be validated and verified. Given a message, anyone can easily perform this attack.…”
Section: Stinson's Attackmentioning
confidence: 99%
“…Stinson [5] proposed a forgery attack where any user can forge a signature that could be validated and verified. Given a message, anyone can easily perform this attack.…”
Section: Stinson's Attackmentioning
confidence: 99%
“…History shows that secure batch verification algorithms are tricky to construct; a number of schemes were presented and subsequently broken or shown to be otherwise flawed. One example is the scheme of Al-Ibrahim et al [1], which was broken by Stinson in [39]. Camenisch et al list and reference ten proposed schemes which were later broken [8, §1.2].…”
Section: Definition 11 ([8])mentioning
confidence: 99%