Cryptanalysis of Lin et al.’s Digital Multi-Signature Scheme on the Generalized Conic Curve Over Zn
نویسندگان
چکیده
In 2009, Lin et al. proposed a digital multi-signature scheme based on the concepts of generalized conic curves over Zn. They claimed that the multi-signature scheme is well secured and the forgery attack is infeasible on it. Unfortunately, three weaknesses on their proposed multi-signature have been observed and it has been shown that an attacker can compute the secret pairs of all signers using the technique to solve the linear Diophantine equation, a malicious signer can generate a forged signature based on the signatures of other signers, called inside forgery attack, which is very difficult to disproof by the verifier. Also an outsider can compute a forged signature against the valid multi-signature, may be termed as outsider forgery attack.
منابع مشابه
A Public-Key Cryptosystem Scheme on Conic Curves over the Ring Zn
A public key cryptosystem scheme is proposed that are based on conic curves over the ring Zn. Our scheme is motivated by KMOV scheme on elliptic curves, but our scheme remove some restrictive condition from KMOV scheme and constructed on conic curves. Its security bases on the difficulty of factoring a composite number n, just like RSA. It can resist some of the known attacks on RSA. We also co...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملCryptanalysis of A Self-Certified Threshold Proxy Signature Scheme Ased on Elliptic Curve Discrete Logarithm Problem
Digital signatures based on self-certified public key systems are more efficient because the authentication of the users’ public keys can be implicitly accomplished with the signature verification. In 2009, Xue et al. proposed first self-certified threshold proxy signature scheme based on the elliptic curve discrete logarithm problem (ECDLP). In this paper, we show that Xue et al.’s scheme can ...
متن کاملAn Efficient Conic Curve Threshold Digital Signature
We propose a new threshold signature scheme based on conic curve. The security of the proposed threshold signature scheme is based on the difficulty of computing the DLP in conic curve groups. It can resist some of the known attacks. Since an exciting characteristic of conic is both encoding and decoding over conic are easily implemented, it can be used in the mobile payment system with the lim...
متن کاملCryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme
In 1998, Dwork et al. first proposed an application of zeroknowledge, deniable authentication protocol. Thereafter, there were many researches about the deniable authentication schemes. In 2004, Shao demonstrated out that the previous schemes had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and they proposed a new...
متن کامل