On the security of a convertible group signature scheme

被引:2
|
作者
Saeednia, S [1 ]
机构
[1] Free Univ Brussels, Dept Informat, B-1050 Brussels, Belgium
关键词
cryptography; group signature;
D O I
10.1016/S0020-0190(00)00009-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two attacks on a group signature scheme proposed by Kim, Park and Won. We show how adversaries can forge secret keys linked to a set of groups that enable them to sign messages on behalf of those groups. The success of the attacks depends on the number of acceptable identities or more precisely, on what constitutes an acceptable identity. We also show how to modify the scheme to make the attacks ineffective, independently of the way identities are defined. (C) 2000 Published by Elsevier Science B.V. All rights reserved.
引用
收藏
页码:93 / 96
页数:4
相关论文
共 50 条
  • [21] Security Analysis of a Convertible Multiauthenticated Encryption Scheme
    Zhang Jian Hong
    Liu Xue
    Liu ChengLian
    [J]. MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
  • [22] Improvement of a convertible undeniable partially blind signature scheme
    Han, Song
    Chang, Elizabeth
    Dillon, Tharam
    Wang, Jie
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 875 - +
  • [23] An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification
    Schuldt, Jacob C. N.
    Matsuura, Kanta
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 276 - 293
  • [24] On the security of the Lee-Chang group signature scheme and its derivatives
    Joye, M
    Lee, NY
    Hwang, T
    [J]. INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 47 - 51
  • [25] Security analysis of Lin-Dou's group signature scheme
    Yu, Bao-Zheng
    Xu, Cong-Wei
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2008, 40 (02): : 125 - 128
  • [26] New convertible undeniable signature scheme's and attack models
    Kobayashi, Y
    Nagata, H
    Saito, T
    Tsujii, S
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 107 - 112
  • [27] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [28] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [29] On the security of a Certificateless Signature Scheme
    Cheng, Lin
    Wen, Qiao Yan
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 965 - 968
  • [30] On the security of an enhanced signature scheme
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    [J]. International Journal of Information and Communication Technology, 2014, 6 (01) : 1 - 6