Cryptology ePrint Archive: Report 2004/302
Security of Wang-Li Threshold Signature Scheme
Abstract: In 2003, Wang et al. proposed a
$(t, n)$ threshold signature scheme without a trusted party based
on the discrete logarithm problem. In this paper, according to
's attacking method, we show that there are still some security
leaks in that scheme, and give some methods of forgery attack.
Moreover, we point out this scheme is vulnerable to universal
forgery by an insider attacker under reasonable assumptions.
Category / Keywords: cryptographic protocols / threshold signature; secret sharing; trusted party
Date: received 12 Nov 2004
Contact author: lfguo at amss ac cn
Available formats: PDF | BibTeX Citation
Version: 20041114:202750 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]