Two attacks on Wu-Chou-Wu's ID-based multisignature schemes are proposed. One is that a user can use his/her identity information to derive the system secrets and the secret keys of the other users. The other is that a hacker can forge the multisignatures of Wu-Chou-Wu's schemes on arbitrary documents. Both attacks show that Wu-Chou-Wu's schemes are not secure enough.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications