@inproceedings{56b8d51f39a44cdf86b90ecc069b5f37,
title = "Comments on a signature scheme based on the third order LFSR proposed at ACISP2001",
abstract = "In this paper we will compare two signature schemes proposed by different sets of authors. One is the XTR-Nyberg-Rueppel signature proposed by A.K. Lenstra and E.R. Verheul in [3] and the other is the signature scheme proposed by C.H. Tan, X. Yi and C.K. Siew (We will call it TYS signature.) in [9]. XTR-NR signature uses the third degree trace projection Tr: GF(p6) → GF(p2) and has been generalized in [8] by Lim et. al. as a scheme in GF(p6m) using Tr: GF(p6m) → GF(p2m). On the other hand, TYS signature is based on a third order LFSR. Tan et. al. claimed that TYS signature is as secure as Schnorr signature scheme. We will explain why these two schemes are essentially the same. In addition, we will point out that TYS signature as it is has some flaws in their arguments. We will show that in order to cure the flaws of TYS signature, one should bring in exactly the same security and efficiency consideration of XTR scheme as in [8].",
keywords = "Digital signature scheme, LFSR, Trace projection, XTR",
author = "Seongan Lim and Seungjoo Kim and Ikkwon Yie and Jaemoon Kim",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2001.; 2nd International Conference on Cryptology in India, INDOCRYPT 2001 ; Conference date: 16-12-2001 Through 20-12-2001",
year = "2001",
doi = "10.1007/3-540-45311-3_29",
language = "English",
isbn = "9783540453116",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "308--315",
editor = "Rangan, {C. Pandu} and Cunsheng Ding",
booktitle = "Progress in Cryptology - INDOCRYPT 2001 - 2nd International Conference on Cryptology in India, Proceedings",
}