Affordable Access

Publisher Website

Attacks on threshold signature schemes with traceable signers

Authors
Journal
Information Processing Letters
0020-0190
Publisher
Elsevier
Publication Date
Volume
71
Issue
1
Identifiers
DOI: 10.1016/s0020-0190(99)00078-2
Keywords
  • Cryptography
  • Threshold Signature
  • Group-Oriented Cryptography

Abstract

Abstract In 1998, Wang et al. proposed two new ( t, n)-threshold signature schemes with traceable signers that can withstand conspiracy attacks without attaching a secret number. However, this article will show that the proposed schemes are insecure by presenting a forgery attack on them. Any malicious attacker can generate a valid group signature for any message without knowing any secret keys of members in a group.

There are no comments yet on this publication. Be the first to share your thoughts.

Statistics

Seen <100 times
0 Comments

More articles like this

Security of Wang et al.'s group-oriented (t,n) thr...

on Information Processing Letters Jan 01, 2001

Threshold signature schemes with traceable signers...

on Computer Communications Jan 01, 1998

Cryptanalysis of group-oriented (t,n) threshold di...

on Computer Standards & Interface... Jan 01, 2004

New threshold-proxy threshold-signature schemes

on Computers & Electrical Enginee... Jan 01, 2005
More articles like this..