Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2004, Vol. 5 Issue ( 9): 20-    DOI: 10.1631/jzus.2004.1155
    
Improvement of Laih and Yen?ˉs multisignature scheme
XIE Qi, YU Xiu-yuan
Department of Mathematics, Zhejiang University, Hangzhou 310027, China; School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, China; Hangzhou Teachers College, Hangzhou 310012, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen?ˉs scheme.

Key wordsMathematics      Digital signature      Multisignature      Cryptography     
Received: 13 June 2003     
CLC:  TP309  
Cite this article:

XIE Qi, YU Xiu-yuan. Improvement of Laih and Yen?ˉs multisignature scheme. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5( 9): 20-.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2004.1155     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2004/V5/I 9/20

[1] Yong-ping DAN, Xue-cheng ZOU, Zheng-lin LIU, Yu HAN, Li-hua YI. High-performance hardware architecture of elliptic curve cryptography processor over GF(2163)[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2009, 10(2): 301-310.
[2] XIE Qi, YU Xiu-yuan. A novel group signature with one time secret key[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(6): 560-564.
[3] YU Dan-sheng, WEI Bao-rong. On Tur¨¢n type inequality with doubling weights and A* weights[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 7): 26-.
[4] WANG Wen-tao, WANG Guo-zhao. B¨|zier curves with shape parameter[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 6): 4-.
[5] LI Zhong, HAN Dan-fu. A fast direct point-by-point generating algorithm for B Spline curves and surfaces[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 6): 5-.
[6] WANG Yang, HWANG Frank K.. Monotone routing in multirate rearrangeable logd(N,m,p) network[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 6): 13-.
[7] LUO Run-zi, SUN Shi-jie. Semi on-line scheduling for maximizing the minimum machine completion time on three uniform machines[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 6): 19-.
[8] JIANG Jun, HE Chen. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 8-.
[9] GUO Yan-wen, PENG Qun-sheng, HU Guo-fei, WANG Jin. Smooth feature line detection for meshes[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 17-.
[10] ISAC G., LI Jin-lu. Exceptional family of elements and the solvability of complementarity problems in uniformly smooth and uniformly convex Banach spaces[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 4): 7-.
[11] ALI M., SAHA L.M.. Local Lyapunov Exponents and characteristics of fixed/periodic points embedded within a chaotic attractor[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 4): 8-.
[12] SHANG You-lin, HAN Bo-shun. One-parameter quasi-filled function algorithm for nonlinear integer programming[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 4): 9-.
[13] PAN Tsorng-Whay, GLOWINSKI Roland, JOSEPH Daniel D.. Simulating the dynamics of fluid-cylinder interactions[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 2): 4-.
[14] HUANG Zheng, CHEN Ke-fei, KOU Wei-dong. Untraceable partially blind signature based on DLOG problem[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 40-44.
[15] GAN Yuan-ju. Verifiable threshold signature schemes against conspiracy attack[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 50-54.