## Cryptology ePrint Archive: Report 2004/302

Security of Wang-Li Threshold Signature Scheme

Lifeng Guo

Abstract: In 2003, Wang et al.[1] proposed a $(t, n)$ threshold signature scheme without a trusted party based on the discrete logarithm problem. In this paper, according to [5]'s attacking method, we show that there are still some security leaks in that scheme, and give some methods of forgery attack. Moreover, we point out this scheme is vulnerable to universal forgery by an insider attacker under reasonable assumptions.

Category / Keywords: cryptographic protocols / threshold signature; secret sharing; trusted party

Contact author: lfguo at amss ac cn

Available format(s): PDF | BibTeX Citation

Short URL: ia.cr/2004/302

[ Cryptology ePrint archive ]