Cryptanalysis of secret-sharing multi-signature scheme without trusted centre

被引:0
|
作者
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 9卷 / 52-54期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given. By using this attack, any attacker can easily forge a valid secret-sharing multi-signature, so that the scheme is not secure. In order to solve this problem, an improved scheme is given, in which all the signers participating in the signing jointly determine the needed signature parameters and only in the case of the signers with the threshold number working together can an effective secret-sharing multi-signature be generated. It is proved that the improved scheme is more secure and effective in resisting the above-mentioned forged attack.
引用
收藏
相关论文
共 50 条
  • [11] Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
    Duo Liu
    Ping Luo
    Yi-Qi Dai
    Journal of Computer Science and Technology, 2007, 22 : 92 - 94
  • [12] Attack on digital multi-signature scheme based on elliptic curve cryptosystem
    Liu, Duo
    Luo, Ping
    Dai, Yi-Qi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 92 - 94
  • [13] An efficient lattice-based threshold signature scheme using multi-stage secret sharing
    Pilaram, Hossein
    Eghlidos, Taraneh
    Toluee, Rahim
    IET INFORMATION SECURITY, 2021, 15 (01) : 98 - 106
  • [14] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [15] Strongly unforgeable threshold multi-proxy multi-signature scheme with different proxy groups
    Liu, D.
    Wang, X.
    Huang, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3693 - 3705
  • [16] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    International Journal of Network Security, 2014, 16 (04) : 249 - 255
  • [17] Efficient discrete logarithm based multi-signature scheme in the plain public key model
    Changshe Ma
    Jian Weng
    Yingjiu Li
    Robert Deng
    Designs, Codes and Cryptography, 2010, 54 : 121 - 133
  • [18] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [19] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [20] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765