Cryptanalysis of multivariate threshold ring signature schemes

被引:0
作者
Omar, Satyam [1 ]
Padhye, Sahadeo [1 ]
Dey, Dhananjoy [2 ]
机构
[1] Motilal Nehru Natl Inst Technol, Dept Math, Allahabad 211004, India
[2] Indian Inst Informat Technol, Dept Math, Lucknow 226002, India
关键词
Multivariate public key cryptography; MQ problem; Threshold ring identification; Threshold ring signature scheme; Cryptography; IDENTIFICATION;
D O I
10.1016/j.ipl.2022.106357
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Petzoldt et al. proposed the first multivariate threshold ring signature scheme extending the idea of a ring identification scheme in 2013. They claimed that their t-out of n threshold ring signature satisfies the security properties of unforgeability and source anonymity. Later, Zhang-Zhao in 2014 and Duong et al. in 2021 proposed other multivariate threshold ring signature schemes using different tools with the same technique. In this article, we cryptanalyze all these schemes and give an attack on their source anonymity which shows how the verifier can find the actual set of signers after some finite number of trials, viz., with at most N = ( n ) + ( n ) + ... + (n ) + (n ) in t-out of n threshold ring. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页数:5
相关论文
共 15 条
  • [1] Bresson E, 2002, LECT NOTES COMPUT SC, V2442, P465
  • [2] Chen YG, 2006, ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, P25
  • [3] Chow SSM, 2004, LECT NOTES COMPUT SC, V3506, P218
  • [4] An efficient multivariate threshold ring signature scheme
    Duong, Dung H.
    Tran, Ha T. N.
    Susilo, Willy
    Le Van Luyen
    [J]. COMPUTER STANDARDS & INTERFACES, 2021, 74
  • [5] HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS
    FIAT, A
    SHAMIR, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 186 - 194
  • [6] Fouque PA, 2005, LECT NOTES COMPUT SC, V3494, P341
  • [7] Garey M.R., 1979, COMPUTERS INTRACTABI
  • [8] EFFICIENT TRACEABLE RING SIGNATURE SCHEME WITHOUT PAIRINGS
    Gu, Ke
    Dong, Xinying
    Wang, Linyu
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020, 14 (02) : 207 - 232
  • [9] Improved Identification Protocol Based on the MQ Problem
    Monteiro, Fabio S.
    Goya, Denise H.
    Terada, Routo
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1255 - 1265
  • [10] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275