CryptoDB
Security of Wang-Li Threshold Signature Scheme
Authors: | |
---|---|
Download: | |
Abstract: | In 2003, Wang et al.[1] proposed a $(t, n)$ threshold signature scheme without a trusted party based on the discrete logarithm problem. In this paper, according to [5]'s attacking method, we show that there are still some security leaks in that scheme, and give some methods of forgery attack. Moreover, we point out this scheme is vulnerable to universal forgery by an insider attacker under reasonable assumptions. |
BibTeX
@misc{eprint-2004-12268, title={Security of Wang-Li Threshold Signature Scheme}, booktitle={IACR Eprint archive}, keywords={cryptographic protocols / threshold signature; secret sharing; trusted party}, url={http://eprint.iacr.org/2004/302}, note={ lfguo@amss.ac.cn 12735 received 12 Nov 2004}, author={Lifeng Guo}, year=2004 }