Cryptanalysis of secret-sharing multi-signature scheme without trusted centre

被引:0
作者
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China [1 ]
机构
来源
Huanan Ligong Daxue Xuebao | 2008年 / 9卷 / 52-54期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given. By using this attack, any attacker can easily forge a valid secret-sharing multi-signature, so that the scheme is not secure. In order to solve this problem, an improved scheme is given, in which all the signers participating in the signing jointly determine the needed signature parameters and only in the case of the signers with the threshold number working together can an effective secret-sharing multi-signature be generated. It is proved that the improved scheme is more secure and effective in resisting the above-mentioned forged attack.
引用
收藏
相关论文
共 50 条
  • [41] A new (t, n) multi-secret sharing scheme based on linear algebra
    Hassani, Seyed Hamed
    Aref, Mohammad Reza
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 443 - +
  • [42] Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Bera, Basudeb
    Das, Ashok Kumar
    Park, Youngho
    Lorenz, Pascal
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 9853 - 9867
  • [43] How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes
    Dehkordi, Massoud Hadian
    Oraei, Hossein
    IET INFORMATION SECURITY, 2019, 13 (04) : 343 - 351
  • [44] A new multi-stage secret sharing scheme using one-way function
    Chang, Ting-Yi
    Hwang, Min-Shiang
    Yang, Wei-Pang
    Operating Systems Review (ACM), 2005, 39 (01): : 48 - 55
  • [45] RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS
    Zhang, En
    Cai, Yongquan
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2013, 24 (06) : 879 - 897
  • [46] A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem
    Guo, Cheng
    Zhang, Huan
    Song, Qiongqiong
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11577 - 11594
  • [47] Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system
    Uganya, G.
    Bommi, R. M.
    Krishnammal, P. Muthu
    Vijayaraj, N.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (06) : 11993 - 12012
  • [48] A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Shao, J
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 135 - 140
  • [49] Meaningful Share Generation for (2,2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion
    Liu, Chao-Liang
    Tsai, Wang-Jui
    Chang, Ting-Yi
    Peng, Chun-Cheng
    Wong, Peng-Shiang
    COMPUTER JOURNAL, 2015, 58 (07) : 1598 - 1606
  • [50] Verifiable secret sharing scheme without dealer based on vector space access structures over bilinear groups
    Wang, Na
    Fu, Junsong
    Zeng, Jiwen
    ELECTRONICS LETTERS, 2018, 54 (02) : 77 - 79