Digital signatures with RSA and other public-key cryptosystems
- 1 April 1984
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 27 (4), 388-392
- https://doi.org/10.1145/358027.358052
Abstract
Public-key signature systems can be vulnerable to attack if the protocols for signing messages allow a cryptanalyst to obtain signatures on arbitrary messages of the cryptanalyst's choice. This vulnerability is shown to arise from the homomorphic structure of public- key systems. A method of foiling the attack is described.Keywords
This publication has 4 references indexed in Scilit:
- Cryptographic protocolsPublished by Association for Computing Machinery (ACM) ,1982
- On the security of public key protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1981
- Protocols for Public Key CryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978