Abstract
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen’s scheme.
Similar content being viewed by others
References
Harn, L., Kiesler, T., 1989. New scheme for digital multisignature. Electron. Lett., 25(15):1002–1003.
He, W.H., 2002. Weakness in some multisignature for specified group of verifiers. Information Processing Letters, 83(2002):95–99.
Itakura, K., Nakamura, K., 1983. A public-key cryptosystem suitable for digital multisignatures. NEC Res. Development, 71(1983):1–8.
Laih, C.S., Yen, S.M., 1996. Multisignature for specified group of verifiers. J. Inform. Sci. Engrg., 12(1):143–152.
Lin, C.C., Laih, C.S., 2000. Cryptanalysis of Nyberg-Rueppel’s message recovery scheme. IEEE Communication Letters, 4(7):231–232
Nyberg, K., Rueppel, R.A., 1994. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. EUROCRYPT’94, p.182–193.
Ohta, K., Okamoto, T., 1991. A Digital Multisinature Scheme Based on the Fiat-Shamir Scheme. Proceedings ASIACRYPY’91, p.139–148.
Author information
Authors and Affiliations
Corresponding author
Additional information
Project (No. 10271037) supported by the National Natural Science Foundation of China
Rights and permissions
About this article
Cite this article
Xie, Q., Yu, Xy. Improvement of Laih and Yen’s multisignature scheme. J. Zheijang Univ.-Sci. 5, 1155–1159 (2004). https://doi.org/10.1631/jzus.2004.1155
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1631/jzus.2004.1155