J4

• Articles • Previous Articles     Next Articles

Analysis and improvement of Wang threshold signature scheme

LI Guo-wei,LI Ru-peng and LI Da-xing   

  1. Institute of Network Security, Shandong Univ., Jinan 250100, Shandong, China
  • Received:2006-05-02 Revised:1900-01-01 Online:2006-10-24 Published:2006-10-24
  • Contact: LI Guo-wei

Abstract: Based on security analysis of Wang's threshold signature scheme, it is pointed out that only the partial private key is valid in the scheme. A simplified scheme is proposed, of which the security is equal to the one of the rectified Wang's scheme. Both schemes are vulnerable to universal forgery by an insider attacker because their underlying signature schemes are unfit for threshold signature. Then a solution is given for this problem.

Key words: threshold multisignature , Lagrange interpolation, discrete logarithm problem, threshold signature

CLC Number: 

  • TP309
[1] ZHANG Yan-yan, YAN Chao. Approximation of lagrange interpolation polynomials based on the fourth Chebyshev nodes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(8): 10-16.
[2] NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen. Improvement of a certificateless aggregate signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 52-59.
[3] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[4] MA Yan, LIU Jian-wei, ZHANG Yu-fei. Threshold signature-based lightweight clustering handover scheme for Ad hoc networks [J]. J4, 2012, 47(11): 78-82.
[5] XU Yan,YU Jia,LI Da-xing . An ID-based proactive threshold blind signature scheme [J]. J4, 2008, 43(1): 55-59 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!