A Structured Multi-signature Scheme Against Forgery Attack

Автор: Wenjun Luo, Changying Li

Журнал: International Journal of Wireless and Microwave Technologies(IJWMT) @ijwmt

Статья в выпуске: 6 Vol.1, 2011 года.

Бесплатный доступ

There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

Structured multi-signature, ElGamal, forgery attack, Discrete logarithm problem

Короткий адрес: https://sciup.org/15012779

IDR: 15012779

Список литературы A Structured Multi-signature Scheme Against Forgery Attack

  • Wanli Lü, Cheng Chung. The Analysis Of Digital Signature Scheme[J] in chinese. Journal of Guangxi Academy of Sciences, 2002,18(4):161-164.
  • Lin CY, Wu TC, Zhang FG. A structured multi-signature scheme from the Gap Diffie-Hellman Group[R]. Cryptology ePrint Archive, 2003.
  • Itakura K, Nakamura K.A public key cryptosystem suitable for digital multi-signature[J].NEC Res and Develop, 1983, 71( 10): 1- 8.
  • Burmester M, Desmedt Y, Doi H, et a1.A structured ElGamal type multisignature scheme [C]. In: Proceedings of PKC 2000, LNCS 1751.466 - 483.
  • Mitomi S, Miyaji A. A muhisignature scheme with message flexibility, order flexibility and order verifiability[C]. In: Proceedings of ACISP 2000, LNCS 1841,298 – 312.
  • Kawauchi K, Tada M. On the exact security of multi-signature schemes based on RSA [C]. Safavi-Naini R, Seberry J(Eds.), ACISP 2003, LNCS 2727, 336 – 349.
  • Harn L, LN CY, WU TC. Structured multisignature algorithms[J]. IEE Proceedings Computers and Digital Techniques, 2004, 153(3):231-234.
  • Jun Zhang. Cryptographic analysis of the two structured multi-signature schemes[J]. Journal of Computational Information Systems 2010, 6(9):3127 - 3135.
Еще
Статья научная