×

Insecure primitive elements in an ElGamal signature protocol. (English) Zbl 1495.94083

MSC:

94A62 Authentication, digital signatures and secret sharing
94A60 Cryptography

References:

[1] Anderson, R.; Vaudenay, S., Advances in Cryptology, Minding your p’s and q’s, 26-35 (1996), Springer-Verlag · Zbl 1007.94540
[2] Bleichenbacher, D., Advances in Cryptology, Generating ElGamal signatures without knowing the secret key, 10-18 (1996), Springer-Verlag · Zbl 1301.94109
[3] Bleichenbacher, D., Generating ElGamal signatures without knowing the secret key (1996) · Zbl 1301.94109
[4] Diffie, W.; Hellman, M. E., New directions in cryptography, IT-22, 644-654 (1976) · Zbl 0435.94018
[5] Dsa, National institute of standard and technology (NIST) (1994), Department of commerce
[6] ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm problem, 469-472 (1985) · Zbl 0571.94014
[7] Horster, P.; Michels, M.; Petersen, H., Generalized ElGamal signature schemes for one message block (1994)
[8] Khadir, O., Conditions on the generator for forging ElGamal signature, Int. J. P. Applied Math, 70, 7, 939-949 (2011)
[9] Kuwakado, H.; Tanaka, H., On the security of the ElGamal-type signature scheme with small parameters, IEICE Trans. Fundamentals Electron. Commun. Comput. Sci, E82, 93-97
[10] Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. A., Handbook of applied cryptography (1997), CRC Press: CRC Press, Boca Raton, Florida · Zbl 0868.94001
[11] Mollin, A. R., An introduction to cryptography (2007), Chapman & Hall/CRC · Zbl 1104.94032
[12] Pohlig, S. C.; Hellman, M. E., An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Information Theory IT-24, 1, 106-110 (1978) · Zbl 0375.68023
[13] Rabin, M. O., Digitalized signatures and public key functions as intractable as factoring, 212 (1979)
[14] Rivest, R.; Shamir, A.; Adeleman, L., A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, 21, 120-126 (1978) · Zbl 0368.94005
[15] Schnorr, C. P., Efficient signature generation by smart cards, J. of Cryptology, 161-174 (1991) · Zbl 0743.68058
[16] Stinson, D. R., Cryptography, theory and practice (2006), Chapman & Hall/CRC · Zbl 1085.94001
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.