Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the par...
Uloženo v:
| Vydáno v: | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 Ročník 1; s. 666 - 668 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.08.2009
|
| Témata: | |
| ISBN: | 0769537448, 9780769537443 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
|---|---|
| AbstractList | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
| Author | Jia Yu Fanyu Kong |
| Author_xml | – sequence: 1 surname: Fanyu Kong fullname: Fanyu Kong organization: Inst. of Network Security, Shandong Univ., Jinan, China – sequence: 2 surname: Jia Yu fullname: Jia Yu organization: Coll. of Inf. Eng., Qingdao Univ., Qingdao, China |
| BookMark | eNotjT1PwzAURS1BJUjpxsaSjcnh-SOxPUYVlEoBhhYxVo7zQg1NUiWxRP49VHS6V0e650bksu1aJOSWQcIYmId1vkk4gEmYgAsSgcpMKpSUekaiEzeggGVXZDEMXwDATKY4l9dk9RqaEnu63WPX4-hdnI-jdd9x18bFFAL9CPdD_BIOo6fHvvuZzn3wn60dQ4_xxu2xwRsyq-1hwMU55-T96XG7fKbF22q9zAvqmUpHKvD0bTOJimeyTKVmWCrDnVQMuK2sqCsJNThwRqqa65ILazRn6d-oLisxJ3f_Xo-Iu2PvG9tPu5RrwaQWv8a-TCo |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/IAS.2009.130 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 668 |
| ExternalDocumentID | 5283148 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| IEDL.DBID | RIE |
| ISBN | 0769537448 9780769537443 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 01:33:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009907016 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_5283148 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-Aug. |
| PublicationDateYYYYMMDD | 2009-08-01 |
| PublicationDate_xml | – month: 08 year: 2009 text: 2009-Aug. |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 |
| PublicationTitleAbbrev | ISIAS |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001967224 |
| Score | 1.4215462 |
| Snippet | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 666 |
| SubjectTerms | digital signature Digital signatures Educational institutions Information security Information systems multi-proxy multi-signature scheme number-theoretic algorithm Polynomials Public key Resists security attack Zinc |
| Title | Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme |
| URI | https://ieeexplore.ieee.org/document/5283148 |
| Volume | 1 |
| WOSCitedRecordID | wos000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4kEvPlrxzR4EL8Z2N9nN5ljEF5RSaMXeSrKZQBG30u4K_nuT7Lb14MVbEgiECWEe-b5vAK6pklSliCTUPUmYfRNEmjgi1MSJYAxTrn3XkgEfDtPpVIwacLvhwiCiB5_hnRv6v3y9yEpXKus6IRIbvjehyXlScbW29RSRcOuOqsxcxJTbvKMW2FnP6Qb4Lrov_XElVhl6_PO2sYr3K4_7_zvRAXS2BL1gtHE9h9DA_Aj2fmkLtuFp6Ht9kMmaqRj0i0Jm78EiDwbfZUneyptV4Pm3xGNZ6rEDdHixz2Bs7_MDO_D6-DC5fyZ11wQyt6FAQSg6Y8iEIbfBjrIZSYiKiyhjLpiQWlKjWc_0sl4mGDdRqiIqRWpdv91klKbH0MoXOZ5AYHMdLQVLRawUUzQSmjGttIpDI2SI5hTaziSzz0oYY1Zb4-zv5XPYrb5iHHruAlrFssRL2Mm-ivlqeeVv8wdv-5yP |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6ZU1Avfmzitz0IXoxrm3RtjkOcG9Yy2MTdRtIkMIadbK3gvzdJu82DF29JIBDeEN6PPM_zAtxizjCPpESecBki-k0gpgIfYRW0KSEyCoXtWhKHSRKNx3RQg_s1F0ZKacFn8sEM7V--mKeFKZW1jBCJDt-3YDsgxHdLttamokLboXZIZW5OAxzqzKOS2FnN8Rr6Tlv9zrCUq_QsAnrTWsV6lu7B_850CM0NRc8ZrJ3PEdRkdgz7v9QFG_Cc2G4faLTiKjqdPGfpzJlnTvxdFOi9uFs6loGLLJqlGhtIh5X7dIb6Rj9kE966T6PHHqr6JqCpDgZyhKUxBmsTGepwh-ucxJM8pH5KTDjBBMNKEFe5qZtSEio_4j5mNNLOX29SXOATqGfzTJ6Co7MdwSiJaMA54dinghDBBQ88RZkn1Rk0jEkmn6U0xqSyxvnfyzew2xu9xpO4n7xcwF75MWOwdJdQzxeFvIKd9CufLhfX9mZ_AMjrn9Y |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+fifth+International+Conference+on+Information+Assurance+and+Security+%3A+18-20+August+2009&rft.atitle=Number-Theoretic+Attack+on+Lyuu-Wu%27s+Multi-proxy+Multi-signature+Scheme&rft.au=Fanyu+Kong&rft.au=Jia+Yu&rft.date=2009-08-01&rft.pub=IEEE&rft.isbn=9780769537443&rft.volume=1&rft.spage=666&rft.epage=668&rft_id=info:doi/10.1109%2FIAS.2009.130&rft.externalDocID=5283148 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/sc.gif&client=summon&freeimage=true |

