Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Hi-index | 0.24 |
Two attacks are given here to show that the identity-based signature scheme proposed by Chang and Lin, based upon Rabin's public key cryptosystem, is not secure enough.