Public-key signature systems can be vulnerable to attack if the protocols for signing messages allow a cryptanalyst to obtain signatures on arbitrary messages of the cryptanalyst's choice. This vulnerability is shown to arise from the homomorphic structure of publickey systems. A method of foiling the attack is described. © 1984, ACM. All rights reserved.
CITATION STYLE
Denning, D. E. (1984). Digital Signatures with RSA and Other Public-key cryptosystems. Communications of the ACM, 27(4), 388–392. https://doi.org/10.1145/358027.358052
Mendeley helps you to discover research relevant for your work.