Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

2 Scopus Citations
View graph of relations

Author(s)

  • Joseph K. Liu
  • Sze Ling Yeo
  • Wun-She Yap
  • Sherman S. M. Chow
  • Duncan S. Wong
  • And 1 others
  • Willy Susilo

Related Research Unit(s)

Detail(s)

Original languageEnglish
Pages (from-to)945-954
Journal / PublicationComputer Journal
Volume59
Issue number7
Publication statusPublished - 1 Jul 2016

Abstract

In this paper, we point out some faulty instantiations of threshold ring signatures (TRS) based on the threshold proof-of-knowledge (TPoK) protocol. Although a TRS can be regarded as the non-interactive version of the TPoK, the computational domains of the variables should be carefully chosen. We show that by choosing some inappropriate domains, two such instantiations suffer from forgery and anonymity attacks. Our attacks rely on algebraic techniques which involve solving some particular instances of the well-known subset sum problem. While we focus our attacks on two particular instantiations of the TRS, they are generic and are applicable to other schemes with the same choice of domains or a similar structure. We believe this paper can act as an important security remark on the design of future TRS schemes.

Research Area(s)

  • threshold proof of knowledge, Threshold ring signature

Citation Format(s)

Faulty instantiations of threshold ring signature from threshold proof-of-knowledge protocol. / Liu, Joseph K.; Yeo, Sze Ling; Yap, Wun-She; Chow, Sherman S. M.; Wong, Duncan S.; Susilo, Willy.

In: Computer Journal, Vol. 59, No. 7, 01.07.2016, p. 945-954.

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review