Cryptanalysis of Chang-Lin-Lam's ID-based multisignature scheme

被引:1
作者
Qian, Haifeng [1 ]
Cao, Zhenfu [1 ]
Wang, Licheng [1 ]
Guo, Sheng [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, 1954 Huashan Rd, Shanghai 200030, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2 | 2006年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/IMSCCS.2006.206
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Chang, Lin and Lam proposed an ID-based multisignature scheme without reblocking and predetermined signing order Their scheme adopts users' id information as the public keys instead of random integers. They has claimed it is computationally infeasible to derive the private key of Key Authentication Center (KAC) from the private keys of the authorized users, and the scheme has the property of resistance against collaboration attacks. However we observed that their scheme cannot be applied in real world, for there are two defects in their scheme and the scheme doesn't satisfy with what they has claimed. The two drawbacks are: (1) not having an efficient verification algorithm (the signature almost can not be verified for the exponent is too large). (2) Even if the signature can be verified, there would exist an forger within the same computation complexity of verification algorithm who can break the scheme (In other words, any one of the signing group can forge on any message for the whole signing group).
引用
收藏
页码:113 / +
页数:2
相关论文
共 6 条
[1]  
BONEH D, 1999, NOT AM MATH SOC, V46, P203
[2]   An ID-based multisignature scheme without reblocking and predetermined signing order [J].
Chang, CC ;
Lin, IC ;
Lam, KY .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (04) :407-413
[3]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[4]   NEW SCHEME FOR DIGITAL MULTISIGNATURES [J].
HARN, L ;
KIESLER, T .
ELECTRONICS LETTERS, 1989, 25 (15) :1002-1003
[5]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[6]  
Shamir A., 1984, P ANN CRYPT C ADV CR, P47, DOI DOI 10.1007/3-540-39568-7