Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme

Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the par...

Full description

Saved in:
Bibliographic Details
Published in:2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 Vol. 1; pp. 666 - 668
Main Authors: Fanyu Kong, Jia Yu
Format: Conference Proceeding
Language:English
Published: IEEE 01.08.2009
Subjects:
ISBN:0769537448, 9780769537443
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.
AbstractList Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.
Author Jia Yu
Fanyu Kong
Author_xml – sequence: 1
  surname: Fanyu Kong
  fullname: Fanyu Kong
  organization: Inst. of Network Security, Shandong Univ., Jinan, China
– sequence: 2
  surname: Jia Yu
  fullname: Jia Yu
  organization: Coll. of Inf. Eng., Qingdao Univ., Qingdao, China
BookMark eNotjT1PwzAURS1BJUjpxsaSjcnh-SOxPUYVlEoBhhYxVo7zQg1NUiWxRP49VHS6V0e650bksu1aJOSWQcIYmId1vkk4gEmYgAsSgcpMKpSUekaiEzeggGVXZDEMXwDATKY4l9dk9RqaEnu63WPX4-hdnI-jdd9x18bFFAL9CPdD_BIOo6fHvvuZzn3wn60dQ4_xxu2xwRsyq-1hwMU55-T96XG7fKbF22q9zAvqmUpHKvD0bTOJimeyTKVmWCrDnVQMuK2sqCsJNThwRqqa65ILazRn6d-oLisxJ3f_Xo-Iu2PvG9tPu5RrwaQWv8a-TCo
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IAS.2009.130
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 668
ExternalDocumentID 5283148
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3
IEDL.DBID RIE
ISBN 0769537448
9780769537443
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 01:33:19 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009907016
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3
PageCount 3
ParticipantIDs ieee_primary_5283148
PublicationCentury 2000
PublicationDate 2009-Aug.
PublicationDateYYYYMMDD 2009-08-01
PublicationDate_xml – month: 08
  year: 2009
  text: 2009-Aug.
PublicationDecade 2000
PublicationTitle 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009
PublicationTitleAbbrev ISIAS
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001967224
Score 1.4214958
Snippet Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang...
SourceID ieee
SourceType Publisher
StartPage 666
SubjectTerms digital signature
Digital signatures
Educational institutions
Information security
Information systems
multi-proxy multi-signature scheme
number-theoretic algorithm
Polynomials
Public key
Resists
security attack
Zinc
Title Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
URI https://ieeexplore.ieee.org/document/5283148
Volume 1
WOSCitedRecordID wos000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4Ne_NjEb3IQvBjXNm3TdxziVBhjsKm7jSRNYYidbK3gf2-SdpsHL96SQCC8HN7X7_d7ANeRUpjJSNAAuUlQtC-oiJBRbXmYwpMZdzMjXwd8OEymUxw14HbDhdFaO_CZvrNL18tPF6q0pbKuFSIx4XsTmpzziqu1radgzI07qjJzjBg3eUctsLPesw3wHbvPvXElVuk7_PN2sIrzK_39_73oADpbgh4ZbVzPITR0fgR7v7QF2_A4dLM-6GTNVCS9ohDqnSxyMvguS_pW3qyI499Sh2Wp1xbQ4cQ-ydj854fuwEv_YXL_ROupCXRuQoGCMm2NIeJQcxPsSJOR-FpyDFRogwmRCpaloZd5ylMY8ixIZMAEJsb1m0uZTNkxtPJFrk-AcMZSRIVJyqQVlUwSxYWnfOnHChUTp9C2Jpl9VsIYs9oaZ38fn8Nu1Yqx6LkLaBXLUl_Cjvoq5qvllfvNHyz4m_8
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6ZU1AvfmzitzkIXoxrm3ZpjkOcG9Yy2NTdRpKmMMROtlbw35uk3ebBi7ckEAhvDu_X8zwvwHUgJUtFwLHHqE5QlMsxDxjByvAwuSNSamdGvkY0jsPxmA1qcLviwiilLPhM3Zml7eUnM1mYUlnLCJHo8H0DNgPf99ySrbWuqLA21Q6pzM1ZQKjOPCqJneWerKDvrNXvDEu5StcioNejVaxn6e7970370FxT9NBg5XwOoKayQ9j9pS7YgMfYTvvAoyVXEXXynMt3NMtQ9F0U-K24WSDLwMUWzVKtDaTDyn2iof7RD9WEl-7D6L6Hq7kJeKqDgRwTZYzB276iOtwROidxlaDMk74JJ3jCSZr4TupIRzKfpl4oPMJZqJ2_vpSKhBxBPZtl6hgQJSRhTLIwIcLISoahpNyRrnDbkknCT6BhTDL5LKUxJpU1Tv8-voLt3ug5mkT9-OkMdsrGjMHSnUM9nxfqArbkVz5dzC_tz_4AfxafRg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+fifth+International+Conference+on+Information+Assurance+and+Security+%3A+18-20+August+2009&rft.atitle=Number-Theoretic+Attack+on+Lyuu-Wu%27s+Multi-proxy+Multi-signature+Scheme&rft.au=Fanyu+Kong&rft.au=Jia+Yu&rft.date=2009-08-01&rft.pub=IEEE&rft.isbn=9780769537443&rft.volume=1&rft.spage=666&rft.epage=668&rft_id=info:doi/10.1109%2FIAS.2009.130&rft.externalDocID=5283148
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/sc.gif&client=summon&freeimage=true