Cryptanalysis of two group signature schemes

16Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

Cite

CITATION STYLE

APA

Joye, M., Kim, S., & Lee, N. Y. (1999). Cryptanalysis of two group signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 271–275). Springer Verlag. https://doi.org/10.1007/3-540-47790-x_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free