Research Article
Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm
Table 3
Comparison of Security analysis with previously implemented schemes.
| Security property | Bisheh N. et al. [34] | Brendel et al. [16] | Großschädl et al. [22] | Proposed |
| Key guessing attacks | N | N | N | Y | Collusion attack | N | N | N | Y | Forgery or key replacement | N | Y | N | Y | Tampering with Ed25519 signature | N | Y | N | Y | Reset attack on Ed25519 | N | Y | N | Y |
|
|