An attack on Horng's identification scheme based on Shamir's modified RSA

Mitchell, C. J. and Ng, S.-L.

(2000)

Mitchell, C. J. and Ng, S.-L. (2000) An attack on Horng's identification scheme based on Shamir's modified RSA. Electronics Letters, 36 (5).

Our Full Text Deposits

Full text access: Open

Full Text - 75.42 KB

Full Text - 33.71 KB

Links to Copies of this Item Held Elsewhere


Abstract

In [1], Horng proposed an identification scheme based on Shamir's modified RSA ([2]). We show that the scheme is vulnerable to active attacks which enable the attacker to obtain the factorisation of the public key.

Information about this Version

This is a Published version
This version's date is: 02/03/2000
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/945bd125-5ce8-380d-470f-d8e6bf2bb4bc/1/

Item TypeJournal Article
TitleAn attack on Horng's identification scheme based on Shamir's modified RSA
AuthorsMitchell, C. J.
Ng, S.-L.
Uncontrolled KeywordsRSA, attacks, Horng
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1049/el:20000351

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 23-Dec-2009

Notes

©20xx IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.


Details