Improvement of Laih and Yen's multisignature scheme.
نویسندگان
چکیده
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme.
منابع مشابه
Research and Improvement of Ordered Multisignature Algorithm in Random Oracle Model
Ordered multisignature allows signers attest to a common message as well as the order in whey they signed. Unlike multi-signature, aggregate signature aggregate signature scheme provides a method to aggregate signature by signature on different messages. In this paper, we presented an ordered multisignature provably secure without random oracles. We mainly focus on construction of perfectly hid...
متن کاملStructured multisignature algorithms - Computers and Digital Techniques, IEE Proceedings-
A structured multisignature scheme is an order-sensitive multisignature scheme that allows participating signers to sign messages in compliance with a specified signing order. It has been shown that the Burmester et al. order-sensitive multisignature scheme cannot prevent all signers producing a valid multisignature without following the specified signing order. The paper proposes two structure...
متن کاملMultisignature Scheme Based on Discrete Logarithms in the Plain Public Key Model
In this paper, we propose a new multisignature scheme based on discrete logarithms. We show that this new scheme can resist existential forgeries against adaptive chosen-message attacks in the random oracle model. The main contribution is that our security model gets rid of the special security requirement on the generation of the signers’ public keys. Adversaries are not required to reveal pri...
متن کاملID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
Multi signature is a signature scheme in which signers jointly generate a signature on a message. Threshold multisignature combines the traits of threshold signature and multisignature. In threshold multisignature, a group of users jointly generate a valid multisignature on a message and any one can verify the validity of the multisignature. However, in some applications the signed message is s...
متن کاملCryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
In this paper, we motivate the need for efficient multisignature schemes in delegated mobile services. With the schemes, delegates can be identified and delegated accesses can be controlled. First, we give a new digital signature scheme with message recovery. Based on the digital signature scheme, two digital multisignature schemes are proposed: the parallel multisignature scheme and the serial...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Zhejiang University. Science
دوره 5 9 شماره
صفحات -
تاریخ انتشار 2004