首页 | 本学科首页   官方微博 | 高级检索  
     

Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
作者姓名:Duo Liu  Ping Luo  and Yi-Qi Dai
作者单位:Department of Computer Science and Technology, Tsinghua University, Bcijing 100084, China
基金项目:This work is supported by the National Natural Science Foundation of China under Grant No. 90304014 and the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314805.
摘    要:The concept of multisignature, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature, was first introduced by Itakura and Nakamura. Several multisignature schemes have been proposed since. Chen et al. proposed a new digital multi-signature scheme based on the elliptic curve cryptosystem recently. In this paper, we show that their scheme is insecure, for it is vulnerable to the so-called active attacks, such as the substitution of a "false" public key to a "true" one in a key directory or during transmission. And then the attacker can sign a legal signature which other users have signed and forge a signature himself which can be accepted by the verifier.

关 键 词:密码系统  安全  数据管理  计算机  代入
收稿时间:5 August 2005
修稿时间:2005-08-052006-11-28

Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem
Duo Liu,Ping Luo,and Yi-Qi Dai.Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem[J].Journal of Computer Science and Technology,2007,22(1):92-94.
Authors:Duo Liu  Ping Luo  Yi-Qi Dai
Affiliation:Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
Abstract:The concept of multisignature, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature, was first introduced by Itakura and Nakamura. Several multisignature schemes have been proposed since. Chen et at proposed a new digital multi-signature scheme based on the elliptic curve cryptosystem recently. In this paper, we show that their scheme is insecure, for it is vulnerable to the so-called active attacks, such as the substitution of a "false" public key to a "true" one in a key directory or during transmission. And then the attacker can sign a legal signature which other users have signed and forge a signature himself which can be accepted by the verifier.
Keywords:digital signature  multi-signature  elliptic curve  cryptography
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号