Cryptanalysis of secret-sharing multi-signature scheme without trusted centre

被引:0
|
作者
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 9卷 / 52-54期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given. By using this attack, any attacker can easily forge a valid secret-sharing multi-signature, so that the scheme is not secure. In order to solve this problem, an improved scheme is given, in which all the signers participating in the signing jointly determine the needed signature parameters and only in the case of the signers with the threshold number working together can an effective secret-sharing multi-signature be generated. It is proved that the improved scheme is more secure and effective in resisting the above-mentioned forged attack.
引用
收藏
相关论文
共 50 条
  • [1] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081
  • [2] GAN-Based Key Secret-Sharing Scheme in Blockchain
    Zheng, Wenbo
    Wang, Kunfeng
    Wang, Fei-Yue
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 393 - 404
  • [3] Verifiably encrypted multi-signature scheme in the standard model
    Chen, C.-H. (godsons@ctu.edu.tw), 1847, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [4] Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel
    Sun, Ying
    Xu, Chunxiang
    Xia, Qi
    Yu, Yong
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 661 - 664
  • [5] Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network
    Zhang, Zu-ping
    Song, Yang
    2ND INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA 2018), 2018, : 439 - 443
  • [6] A novel (n, t, n) secret image sharing scheme without a trusted third party
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2195 - 2209
  • [7] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    Journal of Electronics(China), 2006, (04) : 560 - 563
  • [8] Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme
    Ulutas, Mustafa
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [9] A Multi-proxy Multi-signature Scheme with Different Proxy Groups
    Liu, Danni
    Wang, Lijuan
    Wu, Dongdong
    Wei, Honglei
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1414 - 1418
  • [10] A trusted multi-party authentication scheme based on proactive-ElGamal threshold secret sharing system
    Yang Yu-guang
    Chai Hai-ping
    ADVANCES IN COMPUTING, CONTROL AND INDUSTRIAL ENGINEERING, 2012, 235 : 20 - 24