Abstract
In 1998, Wang et al. proposed two new (t, n)-threshold signature schemes with traceable signers that can withstand conspiracy attacks without attaching a secret number. However, this article will show that the proposed schemes are insecure by presenting a forgery attack on them. Any malicious attacker can generate a valid group signature for any message without knowing any secret keys of members in a group.
Original language | English |
---|---|
Pages (from-to) | 1-4 |
Number of pages | 4 |
Journal | Information Processing Letters |
Volume | 71 |
Issue number | 1 |
DOIs | |
Publication status | Published - 1999 Jul 16 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications