In 1998, Wang et al. proposed two new (t, n)-threshold signature schemes with traceable signers that can withstand conspiracy attacks without attaching a secret number. However, this article will show that the proposed schemes are insecure by presenting a forgery attack on them. Any malicious attacker can generate a valid group signature for any message without knowing any secret keys of members in a group.
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Signal Processing
- Information Systems
- Computer Science Applications