INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.1, No.6, Dec. 2011

A Structured Multi-signature Scheme Against Forgery Attack

Full Text (PDF, 122KB), PP.65-72


Views:61   Downloads:1

Author(s)

Wenjun Luo,Changying Li

Index Terms

Structured multi-signature; ElGamal; forgery attack; Discrete logarithm problem

Abstract

There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack. Then we propose a structured multi-signature scheme against forgery attack. In the new scheme, we increase the signature parameter verification to improve security.

Cite This Paper

Wenjun Luo,Changying Li,"A Structured Multi-signature Scheme Against Forgery Attack", IJWMT, vol.1, no.6, pp.65-72, 2011.

Reference

[1]Wanli Lü, Cheng Chung. The Analysis Of Digital Signature Scheme[J] in chinese. Journal of Guangxi Academy of Sciences, 2002,18(4):161-164.

[2]Lin CY, Wu TC, Zhang FG. A structured multi-signature scheme from the Gap Diffie-Hellman Group[R]. Cryptology ePrint Archive, 2003.

[3]Itakura K, Nakamura K.A public key cryptosystem suitable for digital multi-signature[J].NEC Res and Develop, 1983, 71( 10): 1- 8.

[4]Burmester M, Desmedt Y, Doi H, et a1.A structured ElGamal type multisignature scheme [C]. In: Proceedings of PKC 2000, LNCS 1751.466 - 483.

[5]Mitomi S, Miyaji A. A muhisignature scheme with message flexibility, order flexibility and order verifiability[C]. In: Proceedings of ACISP 2000, LNCS 1841,298 – 312.

[6]Kawauchi K, Tada M. On the exact security of multi-signature schemes based on RSA [C]. Safavi-Naini R, Seberry J(Eds.), ACISP 2003, LNCS 2727, 336 – 349.

[7]Harn L, LN CY, WU TC. Structured multisignature algorithms[J]. IEE Proceedings Computers and Digital Techniques, 2004, 153(3):231-234.

[8]Jun Zhang. Cryptographic analysis of the two structured multi-signature schemes[J]. Journal of Computational Information Systems 2010, 6(9):3127 - 3135.