Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Attacks on the birational permutation signature schemes
 
conference paper

Attacks on the birational permutation signature schemes

Coppersmith, Don
•
Stern, Jacques
•
Vaudenay, Serge  
1993
Advances in Cryptology — CRYPTO’ 93
Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference

Shamir (1993) presented a family of cryptographic signature schemes based on birational permutations of the integers modulo a large integer N of unknown factorization. These schemes are attractive because of the low computational requirements, both for signature generation and signature verification. However, the two schemes presented in Shamir's paper are weak. We show how to break the first scheme, by first reducing it algebraically to the earlier Ong-Schnorr-Shamir signature scheme (1984), and then applying the Pollard (1987) solution to that scheme. We then show some attacks on the second scheme. These attacks give ideas which can be applied to schemes in this general family

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

liens-93-25.ps

Access type

openaccess

Size

145.79 KB

Format

Postscript

Checksum (MD5)

4f6b079513501708565e589c156aa38c

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés