Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the par...
Saved in:
| Published in: | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 Vol. 1; pp. 666 - 668 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.08.2009
|
| Subjects: | |
| ISBN: | 0769537448, 9780769537443 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
|---|---|
| AbstractList | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter N and Q by using efficient number-theoretic algorithms when Q is roughly larger than the square root of N. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case. |
| Author | Jia Yu Fanyu Kong |
| Author_xml | – sequence: 1 surname: Fanyu Kong fullname: Fanyu Kong organization: Inst. of Network Security, Shandong Univ., Jinan, China – sequence: 2 surname: Jia Yu fullname: Jia Yu organization: Coll. of Inf. Eng., Qingdao Univ., Qingdao, China |
| BookMark | eNotjT1PwzAURS1BJUjpxsaSjcnh-SOxPUYVlEoBhhYxVo7zQg1NUiWxRP49VHS6V0e650bksu1aJOSWQcIYmId1vkk4gEmYgAsSgcpMKpSUekaiEzeggGVXZDEMXwDATKY4l9dk9RqaEnu63WPX4-hdnI-jdd9x18bFFAL9CPdD_BIOo6fHvvuZzn3wn60dQ4_xxu2xwRsyq-1hwMU55-T96XG7fKbF22q9zAvqmUpHKvD0bTOJimeyTKVmWCrDnVQMuK2sqCsJNThwRqqa65ILazRn6d-oLisxJ3f_Xo-Iu2PvG9tPu5RrwaQWv8a-TCo |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/IAS.2009.130 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EndPage | 668 |
| ExternalDocumentID | 5283148 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| IEDL.DBID | RIE |
| ISBN | 0769537448 9780769537443 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 01:33:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009907016 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-3e0019a64e7264b5481eb792c47102ada3fd40f0c0c947f28b23a982159a6fbd3 |
| PageCount | 3 |
| ParticipantIDs | ieee_primary_5283148 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-Aug. |
| PublicationDateYYYYMMDD | 2009-08-01 |
| PublicationDate_xml | – month: 08 year: 2009 text: 2009-Aug. |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 fifth International Conference on Information Assurance and Security : 18-20 August 2009 |
| PublicationTitleAbbrev | ISIAS |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001967224 |
| Score | 1.4215462 |
| Snippet | Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 666 |
| SubjectTerms | digital signature Digital signatures Educational institutions Information security Information systems multi-proxy multi-signature scheme number-theoretic algorithm Polynomials Public key Resists security attack Zinc |
| Title | Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme |
| URI | https://ieeexplore.ieee.org/document/5283148 |
| Volume | 1 |
| WOSCitedRecordID | wos000275852000152&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA1t8aAXP1rxmz0IXoxNN2myORaxKpRSaNXeSpKdQBG30u4K_nuT7Lb14MVbEkgIM4eZSd57g9B1bLTgKRgMlmjMYsuwBA6YJUqlMiWGhx5LrwMxHCbTqRzV0O2GCwMAAXwGd34Y_vLThSn8U1nbC5G49L2O6kLwkqu1fU-RXLhwVFbmskuFqzsqgZ31nG6A77L93BuXYpWdgH_eNlYJcaW__78bHaDWlqAXjTah5xDVIDtCe7-0BZvocRh6feDJmqkY9fJcmfdokUWD76LAb8XNKgr8WxywLNXYAzqC2Gc0dv78gBZ66T9M7p9w1TUBz10qkGMK3hiKMxAu2dGuIumAFjI2zCcTKlXUpoxYYoiRTNg40TFVMnGh322yOqXHqJEtMjhBkdKJ4YZbaak7ibnSjjABxHQpY1opcoqa3iSzz1IYY1ZZ4-zv5XO0W37FePTcBWrkywIu0Y75yuer5VXw5g_7VZzp |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NTwIxEG0QTdSLH2D8dg8mXqyUbdluj8SIENcNCajcSLc7TYgRDOya-O9tuwt48OKtbdKmmTnMTPveG4SufZXwIAWFQZMEM18zLCAAzEIpU5ESFbgeS68Rj-NwNBL9CrpdcWEAwIHP4M4O3V9-OlO5fSprWCESk75voM0WYz4p2FrrFxURcBOQitpctCg3lUcpsbOc0xX0XTR67UEhV9l0COh1axUXWTp7_7vTPqqvKXpefxV8DlAFpodo95e6YA09xq7bBx4uuYpeO8ukevdmUy_6znP8lt8sPMfAxQ7NUo4tpMPJfXoD49EPqKOXzsPwvovLvgl4YpKBDFOwxpABA27SncTUJE1IuPAVs-mETCXVKSOaKKIE49oPE59KEZrgbzbpJKVHqDqdTeEYeTIJVaACLTQ1JzFT3BHGgagWZSyRkpygmjXJ-LOQxhiX1jj9e_kKbXeHz9E46sVPZ2in-JixWLpzVM3mOVygLfWVTRbzS-fZH1oWoDA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+fifth+International+Conference+on+Information+Assurance+and+Security+%3A+18-20+August+2009&rft.atitle=Number-Theoretic+Attack+on+Lyuu-Wu%27s+Multi-proxy+Multi-signature+Scheme&rft.au=Fanyu+Kong&rft.au=Jia+Yu&rft.date=2009-08-01&rft.pub=IEEE&rft.isbn=9780769537443&rft.volume=1&rft.spage=666&rft.epage=668&rft_id=info:doi/10.1109%2FIAS.2009.130&rft.externalDocID=5283148 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769537443/sc.gif&client=summon&freeimage=true |

