Cryptanalysis of two group signature schemes

Marc Joye, Seung-Joo Kim, Narn Yih Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages271-275
Number of pages5
Volume1729
ISBN (Print)3540666958, 9783540666950
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia
Duration: 1999 Nov 61999 Nov 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1729
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Information Security Workshop, ISW 1999
CountryMalaysia
CityKuala Lumpur
Period99/11/699/11/7

    Fingerprint

Keywords

  • Cryptanalysis
  • Digital signatures
  • Group signatures
  • Universal forgeries

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Joye, M., Kim, S-J., & Lee, N. Y. (1999). Cryptanalysis of two group signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 271-275). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729). Springer Verlag.