This note continues a sequence of attempts to define efficient digital signature schemes based on low-degree polynomials, or to break such schemes. We consider a scheme proposed by Satoh and Araki [5], which generalizes the Ong-Schnorr-Shamir scheme to the noncommutative ring of quaternions. We give two different ways to break the scheme. © 2001 International Association for Cryptologic Research.
CITATION STYLE
Coppersmith, D. (2001). Weakness in quaternion signatures. Journal of Cryptology, 14(2), 77–85. https://doi.org/10.1007/s001450010006
Mendeley helps you to discover research relevant for your work.