Cryptanalysis of secret-sharing multi-signature scheme without trusted centre

被引:0
作者
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 9卷 / 52-54期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given. By using this attack, any attacker can easily forge a valid secret-sharing multi-signature, so that the scheme is not secure. In order to solve this problem, an improved scheme is given, in which all the signers participating in the signing jointly determine the needed signature parameters and only in the case of the signers with the threshold number working together can an effective secret-sharing multi-signature be generated. It is proved that the improved scheme is more secure and effective in resisting the above-mentioned forged attack.
引用
收藏
相关论文
共 50 条
  • [31] On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Xu, Jianqiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4441 - 4442
  • [32] A multi-secret sharing scheme for 3D solid objects
    Martin del Rey, A.
    EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (04) : 2114 - 2120
  • [33] AN IMPROVED MULTI-STAGE SECRET SHARING SCHEME BASED ON THE FACTORIZATION PROBLEM
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 246 - 251
  • [34] A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method
    Hu, Weitong
    Yao, Ye
    Zhou, Di
    Zheng, Qiuhua
    Choo, Kim-Kwang Raymond
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (04) : 1317 - 1335
  • [35] Flexible meaningful visual multi-secret sharing scheme by random grids
    Huang, Bo-Yuan
    Juan, Justie Su-Tzu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7705 - 7729
  • [36] Cluster Oriented ID Based Multi-signature Scheme for Traffic Congestion Warning in Vehicular Ad Hoc Networks
    Jinila, Bevish
    Komathy
    EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 : 337 - 345
  • [37] An RSA-based (t, n) threshold proxy signature scheme without any trusted combiner
    Ting, Pei-yih
    Huang, Xiao-Wei
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 277 - 284
  • [38] A Self-Authenticating Multi-Tone Secret Sharing Scheme Using Meaningful Shares for Satellite Images
    Sharma, Suchita
    Shivani, Shivendra
    Saxena, Nitin
    IEEE ACCESS, 2024, 12 : 101563 - 101591
  • [39] Many-agent controlled multi-player quantum secret sharing scheme
    Man, Zhong-Xiao
    Xia, Yun-Jie
    Zhang, Zhan-Jun
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 177 - 185
  • [40] A NEW VERIFIABLE MULTI-SECRET SHARING SCHEME BASED ON ELLIPTIC CURVES AND PAIRINGS
    Bahramian, Mojtaba
    Eslami, Khadijeh
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2019, (41): : 456 - 468