Security analysis on a kind of group signatures
In 1998, Lee and Chang proposed a group signature scheme based on the discrete logarithm problem.Tseng, Jan and Ao gave respectively new improved scheme based on Lee-Chang scheme. In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2003-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74361165/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850096573662363648 |
|---|---|
| author | SI Tao-zhi1 WANG Ze-cheng1 LI Zhi-bin1 ZHOU Zhen-jiang1 |
| author_facet | SI Tao-zhi1 WANG Ze-cheng1 LI Zhi-bin1 ZHOU Zhen-jiang1 |
| author_sort | SI Tao-zhi1 |
| collection | DOAJ |
| description | In 1998, Lee and Chang proposed a group signature scheme based on the discrete logarithm problem.Tseng, Jan and Ao gave respectively new improved scheme based on Lee-Chang scheme. In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack. |
| format | Article |
| id | doaj-art-82cc960a67d84ba4b67b6460de6d7bbd |
| institution | DOAJ |
| issn | 1000-436X |
| language | zho |
| publishDate | 2003-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-82cc960a67d84ba4b67b6460de6d7bbd2025-08-20T02:41:11ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2003-01-0114314974361165Security analysis on a kind of group signaturesSI Tao-zhi1WANG Ze-cheng1LI Zhi-bin1ZHOU Zhen-jiang1In 1998, Lee and Chang proposed a group signature scheme based on the discrete logarithm problem.Tseng, Jan and Ao gave respectively new improved scheme based on Lee-Chang scheme. In this paper, we show there are still some security leaks in these schemes, and give some methods of forgery attack.http://www.joconline.com.cn/zh/article/74361165/discrete logarithmgroup signatureforgery attackanonymity |
| spellingShingle | SI Tao-zhi1 WANG Ze-cheng1 LI Zhi-bin1 ZHOU Zhen-jiang1 Security analysis on a kind of group signatures Tongxin xuebao discrete logarithm group signature forgery attack anonymity |
| title | Security analysis on a kind of group signatures |
| title_full | Security analysis on a kind of group signatures |
| title_fullStr | Security analysis on a kind of group signatures |
| title_full_unstemmed | Security analysis on a kind of group signatures |
| title_short | Security analysis on a kind of group signatures |
| title_sort | security analysis on a kind of group signatures |
| topic | discrete logarithm group signature forgery attack anonymity |
| url | http://www.joconline.com.cn/zh/article/74361165/ |
| work_keys_str_mv | AT sitaozhi1 securityanalysisonakindofgroupsignatures AT wangzecheng1 securityanalysisonakindofgroupsignatures AT lizhibin1 securityanalysisonakindofgroupsignatures AT zhouzhenjiang1 securityanalysisonakindofgroupsignatures |