Chris J. Mitchell (2001) An attack on an ID-based multisignature scheme.
Full text access: Open
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwang.
This is a Published version This version's date is: 19/12/2001 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/240ba3cc-f893-2364-0c30-980167d0c5d2/1/
Deposited by () on 15-Jul-2010 in Royal Holloway Research Online.Last modified on 08-Dec-2010
[1] C.-Y. Lin, T.-C. Wu, and J.-J. Hwang. ID-based structured multisignatureschemes. In B. De Decker, F. Piessens, J. Smits, and E. VanHerreweghen, editors, Advances in Network and Distributed Systems Security,pages 45–59. Kluwer Academic Publishers, Boston, 2001.