Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the par...
Saved in:
| Published in: | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 Vol. 1; pp. 666 - 668 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.08.2009
|
| Subjects: | |
| ISBN: | 0769537448, 9780769537443 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
|---|---|
| AbstractList | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
| Author | Jia Yu Fanyu Kong |
| Author_xml | – sequence: 1 surname: Fanyu Kong fullname: Fanyu Kong organization: Inst. of Network Security, Shandong Univ., Jinan, China – sequence: 2 surname: Jia Yu fullname: Jia Yu organization: Coll. of Inf. Eng., Qingdao Univ., Qingdao, China |
| BookMark | eNotjT1PwzAURS1BJUjpxsaSjcnh-SOxPUYVlEoBhhYxVo7zQg1NUiWxRP49VHS6V0e650bksu1aJOSWQcIYmId1vkk4gEmYgAsSgcpMKpSUekaiEzeggGVXZDEMXwDATKY4l9dk9RqaEnu63WPX4-hdnI-jdd9x18bFFAL9CPdD_BIOo6fHvvuZzn3wn60dQ4_xxu2xwRsyq-1hwMU55-T96XG7fKbF22q9zAvqmUpHKvD0bTOJimeyTKVmWCrDnVQMuK2sqCsJNThwRqqa65ILazRn6d-oLisxJ3f_Xo-Iu2PvG9tPu5RrwaQWv8a-TCo |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/IAS.2009.130 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 668 |
| ExternalDocumentID | 5283148 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| IEDL.DBID | RIE |
| ISBN | 0769537448 9780769537443 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 01:33:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009907016 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_5283148 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-Aug. |
| PublicationDateYYYYMMDD | 2009-08-01 |
| PublicationDate_xml | – month: 08 year: 2009 text: 2009-Aug. |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 |
| PublicationTitleAbbrev | ISIAS |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001967224 |
| Score | 1.4214958 |
| Snippet | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 666 |
| SubjectTerms | digital signature Digital signatures Educational institutions Information security Information systems multi-proxy multi-signature scheme number-theoretic algorithm Polynomials Public key Resists security attack Zinc |
| Title | Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme |
| URI | https://ieeexplore.ieee.org/document/5283148 |
| Volume | 1 |
| WOSCitedRecordID | wos000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH9sw4Ne_NjEb3IQvBjXNm3TdxziVBhjsKm7jSRNYYidbK3gf2-SdpsHL96SQCC8HN7X7_d7ANeRUpjJSNAAuUlQtC-oiJBRbXmYwpMZdzMjXwd8OEymUxw14HbDhdFaO_CZvrNL18tPF6q0pbKuFSIx4XsTmpzziqu1radgzI07qjJzjBg3eUctsLPesw3wHbvPvXElVuk7_PN2sIrzK_39_73oADpbgh4ZbVzPITR0fgR7v7QF2_A4dLM-6GTNVCS9ohDqnSxyMvguS_pW3qyI499Sh2Wp1xbQ4cQ-ydj854fuwEv_YXL_ROupCXRuQoGCMm2NIeJQcxPsSJOR-FpyDFRogwmRCpaloZd5ylMY8ixIZMAEJsb1m0uZTNkxtPJFrk-AcMZSRIVJyqQVlUwSxYWnfOnHChUTp9C2Jpl9VsIYs9oaZ38fn8Nu1Yqx6LkLaBXLUl_Cjvoq5qvllfvNHyz4m_8 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6ZU1AvfmzitzkIXoxrm3ZpjkOcG9Yy2NTdRpKmMMROtlbw35uk3ebBi7ckEAhvDu_X8zwvwHUgJUtFwLHHqE5QlMsxDxjByvAwuSNSamdGvkY0jsPxmA1qcLviwiilLPhM3Zml7eUnM1mYUlnLCJHo8H0DNgPf99ySrbWuqLA21Q6pzM1ZQKjOPCqJneWerKDvrNXvDEu5StcioNejVaxn6e7970370FxT9NBg5XwOoKayQ9j9pS7YgMfYTvvAoyVXEXXynMt3NMtQ9F0U-K24WSDLwMUWzVKtDaTDyn2iof7RD9WEl-7D6L6Hq7kJeKqDgRwTZYzB276iOtwROidxlaDMk74JJ3jCSZr4TupIRzKfpl4oPMJZqJ2_vpSKhBxBPZtl6hgQJSRhTLIwIcLISoahpNyRrnDbkknCT6BhTDL5LKUxJpU1Tv8-voLt3ug5mkT9-OkMdsrGjMHSnUM9nxfqArbkVz5dzC_tz_4AfxafRg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+fifth+International+Conference+on+Information+Assurance+and+Security+%3A+18-20+August+2009&rft.atitle=Number-Theoretic+Attack+on+Lyuu-Wu%27s+Multi-proxy+Multi-signature+Scheme&rft.au=Fanyu+Kong&rft.au=Jia+Yu&rft.date=2009-08-01&rft.pub=IEEE&rft.isbn=9780769537443&rft.volume=1&rft.spage=666&rft.epage=668&rft_id=info:doi/10.1109%2FIAS.2009.130&rft.externalDocID=5283148 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/sc.gif&client=summon&freeimage=true |

