TY - GEN
T1 - Cryptanalysis of two group signature schemes
AU - Joye, Marc
AU - Kim, Seungjoo
AU - Lee, Narn Yih
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1999.
PY - 1999
Y1 - 1999
N2 - Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.
AB - Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.
UR - https://www.scopus.com/pages/publications/84948164432
UR - https://www.scopus.com/pages/publications/84948164432#tab=citedBy
U2 - 10.1007/3-540-47790-x_23
DO - 10.1007/3-540-47790-x_23
M3 - Conference contribution
AN - SCOPUS:84948164432
SN - 3540666958
SN - 9783540666950
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 271
EP - 275
BT - Information Security - 2nd International Workshop, ISW 1999, Proceedings
A2 - Mambo, Masahiro
A2 - Zheng, Yuliang
PB - Springer Verlag
T2 - 2nd International Information Security Workshop, ISW 1999
Y2 - 6 November 1999 through 7 November 1999
ER -