Attack on a concast signature scheme

  • Authors:
  • D. R. Stinson

  • Affiliations:
  • School of Computer Science, University of Waterloo, Waterloo, ON, N2L 3G1, Canada

  • Venue:
  • Information Processing Letters - Devoted to the rapid publication of short contributions to information processing
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Al-Ibrahim, Ghodosi and Pieprzyk proposed several methods of batch signature verification suitable for concast communication. These schemes are all based on El-Gamal-type signature schemes. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.