Abstract
Public-key signature systems can be vulnerable to attack if the protocols for signing messages allow a cryptanalyst to obtain signatures on arbitrary messages of the cryptanalyst's choice. This vulnerability is shown to arise from the homomorphic structure of public- key systems. A method of foiling the attack is described.

This publication has 4 references indexed in Scilit: