Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme

Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the par...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 Ročník 1; s. 666 - 668
Hlavní autoři: Fanyu Kong, Jia Yu
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.08.2009
Témata:
ISBN:0769537448, 9780769537443
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.
AbstractList Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.
Author Jia Yu
Fanyu Kong
Author_xml – sequence: 1
  surname: Fanyu Kong
  fullname: Fanyu Kong
  organization: Inst. of Network Security, Shandong Univ., Jinan, China
– sequence: 2
  surname: Jia Yu
  fullname: Jia Yu
  organization: Coll. of Inf. Eng., Qingdao Univ., Qingdao, China
BookMark eNotjT1PwzAURS1BJUjpxsaSjcnh-SOxPUYVlEoBhhYxVo7zQg1NUiWxRP49VHS6V0e650bksu1aJOSWQcIYmId1vkk4gEmYgAsSgcpMKpSUekaiEzeggGVXZDEMXwDATKY4l9dk9RqaEnu63WPX4-hdnI-jdd9x18bFFAL9CPdD_BIOo6fHvvuZzn3wn60dQ4_xxu2xwRsyq-1hwMU55-T96XG7fKbF22q9zAvqmUpHKvD0bTOJimeyTKVmWCrDnVQMuK2sqCsJNThwRqqa65ILazRn6d-oLisxJ3f_Xo-Iu2PvG9tPu5RrwaQWv8a-TCo
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IAS.2009.130
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 668
ExternalDocumentID 5283148
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3
IEDL.DBID RIE
ISBN 0769537448
9780769537443
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 01:33:19 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009907016
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3
PageCount 3
ParticipantIDs ieee_primary_5283148
PublicationCentury 2000
PublicationDate 2009-Aug.
PublicationDateYYYYMMDD 2009-08-01
PublicationDate_xml – month: 08
  year: 2009
  text: 2009-Aug.
PublicationDecade 2000
PublicationTitle 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009
PublicationTitleAbbrev ISIAS
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001967224
Score 1.4215462
Snippet Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang...
SourceID ieee
SourceType Publisher
StartPage 666
SubjectTerms digital signature
Digital signatures
Educational institutions
Information security
Information systems
multi-proxy multi-signature scheme
number-theoretic algorithm
Polynomials
Public key
Resists
security attack
Zinc
Title Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
URI https://ieeexplore.ieee.org/document/5283148
Volume 1
WOSCitedRecordID wos000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4kEvPlrxzR4EL8Z2N9nN5ljEF5RSaMXeSrKZQBG30u4K_nuT7Lb14MVbEgiECWEe-b5vAK6pklSliCTUPUmYfRNEmjgi1MSJYAxTrn3XkgEfDtPpVIwacLvhwiCiB5_hnRv6v3y9yEpXKus6IRIbvjehyXlScbW29RSRcOuOqsxcxJTbvKMW2FnP6Qb4Lrov_XElVhl6_PO2sYr3K4_7_zvRAXS2BL1gtHE9h9DA_Aj2fmkLtuFp6Ht9kMmaqRj0i0Jm78EiDwbfZUneyptV4Pm3xGNZ6rEDdHixz2Bs7_MDO_D6-DC5fyZ11wQyt6FAQSg6Y8iEIbfBjrIZSYiKiyhjLpiQWlKjWc_0sl4mGDdRqiIqRWpdv91klKbH0MoXOZ5AYHMdLQVLRawUUzQSmjGttIpDI2SI5hTaziSzz0oYY1Zb4-zv5XPYrb5iHHruAlrFssRL2Mm-ivlqeeVv8wdv-5yP
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6ZU1Avfmzitz0IXoxrm3RtjkOcG9Yy2MTdRtIkMIadbK3gvzdJu82DF29JIBDeEN6PPM_zAtxizjCPpESecBki-k0gpgIfYRW0KSEyCoXtWhKHSRKNx3RQg_s1F0ZKacFn8sEM7V--mKeFKZW1jBCJDt-3YDsgxHdLttamokLboXZIZW5OAxzqzKOS2FnN8Rr6Tlv9zrCUq_QsAnrTWsV6lu7B_850CM0NRc8ZrJ3PEdRkdgz7v9QFG_Cc2G4faLTiKjqdPGfpzJlnTvxdFOi9uFs6loGLLJqlGhtIh5X7dIb6Rj9kE966T6PHHqr6JqCpDgZyhKUxBmsTGepwh-ucxJM8pH5KTDjBBMNKEFe5qZtSEio_4j5mNNLOX29SXOATqGfzTJ6Co7MdwSiJaMA54dinghDBBQ88RZkn1Rk0jEkmn6U0xqSyxvnfyzew2xu9xpO4n7xcwF75MWOwdJdQzxeFvIKd9CufLhfX9mZ_AMjrn9Y
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+fifth+International+Conference+on+Information+Assurance+and+Security+%3A+18-20+August+2009&rft.atitle=Number-Theoretic+Attack+on+Lyuu-Wu%27s+Multi-proxy+Multi-signature+Scheme&rft.au=Fanyu+Kong&rft.au=Jia+Yu&rft.date=2009-08-01&rft.pub=IEEE&rft.isbn=9780769537443&rft.volume=1&rft.spage=666&rft.epage=668&rft_id=info:doi/10.1109%2FIAS.2009.130&rft.externalDocID=5283148
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/sc.gif&client=summon&freeimage=true