Security of two ID-based multisignature protocols for sequential and broadcasting architectures

Narn Yih Lee, Tzonelih Hwang, Chih Hung Wang

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Two attacks on Wu-Chou-Wu's ID-based multisignature schemes are proposed. One is that a user can use his/her identity information to derive the system secrets and the secret keys of the other users. The other is that a hacker can forge the multisignatures of Wu-Chou-Wu's schemes on arbitrary documents. Both attacks show that Wu-Chou-Wu's schemes are not secure enough.

Original languageEnglish
Pages (from-to)79-81
Number of pages3
JournalInformation Processing Letters
Volume70
Issue number2
DOIs
Publication statusPublished - 1999 Apr 30

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Signal Processing
  • Information Systems
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Security of two ID-based multisignature protocols for sequential and broadcasting architectures'. Together they form a unique fingerprint.

Cite this