Cryptanalysis of two group signature schemes

Marc Joye, Seung-Joo Kim, Narn Yih Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages271-275
Number of pages5
Volume1729
ISBN (Print)3540666958, 9783540666950
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia
Duration: 1999 Nov 61999 Nov 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1729
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd International Information Security Workshop, ISW 1999
CountryMalaysia
CityKuala Lumpur
Period99/11/699/11/7

Fingerprint

Group Signature
Group Scheme
Cryptanalysis
Signature Scheme
Anonymity
Signature
Valid
Arbitrary

Keywords

  • Cryptanalysis
  • Digital signatures
  • Group signatures
  • Universal forgeries

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Joye, M., Kim, S-J., & Lee, N. Y. (1999). Cryptanalysis of two group signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1729, pp. 271-275). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729). Springer Verlag.

Cryptanalysis of two group signature schemes. / Joye, Marc; Kim, Seung-Joo; Lee, Narn Yih.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729 Springer Verlag, 1999. p. 271-275 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1729).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Joye, M, Kim, S-J & Lee, NY 1999, Cryptanalysis of two group signature schemes. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 1729, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1729, Springer Verlag, pp. 271-275, 2nd International Information Security Workshop, ISW 1999, Kuala Lumpur, Malaysia, 99/11/6.
Joye M, Kim S-J, Lee NY. Cryptanalysis of two group signature schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729. Springer Verlag. 1999. p. 271-275. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Joye, Marc ; Kim, Seung-Joo ; Lee, Narn Yih. / Cryptanalysis of two group signature schemes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1729 Springer Verlag, 1999. pp. 271-275 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{8f0cdecb5bae4521aa81c06e1f4a85ab,
title = "Cryptanalysis of two group signature schemes",
abstract = "Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.",
keywords = "Cryptanalysis, Digital signatures, Group signatures, Universal forgeries",
author = "Marc Joye and Seung-Joo Kim and Lee, {Narn Yih}",
year = "1999",
language = "English",
isbn = "3540666958",
volume = "1729",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "271--275",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Cryptanalysis of two group signature schemes

AU - Joye, Marc

AU - Kim, Seung-Joo

AU - Lee, Narn Yih

PY - 1999

Y1 - 1999

N2 - Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

AB - Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

KW - Cryptanalysis

KW - Digital signatures

KW - Group signatures

KW - Universal forgeries

UR - http://www.scopus.com/inward/record.url?scp=84948164432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84948164432&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84948164432

SN - 3540666958

SN - 9783540666950

VL - 1729

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 271

EP - 275

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -