Advanced Search
Volume 29 Issue 7
Jan.  2011
Turn off MathJax
Article Contents
Li Yan-jun, Wu Yu-hua, Li Meng-dong, Yang Gang. Forgery Attack to a Group Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1772-1774. doi: 10.3724/SP.J.1146.2005.01623
Citation: Li Yan-jun, Wu Yu-hua, Li Meng-dong, Yang Gang. Forgery Attack to a Group Signature Scheme[J]. Journal of Electronics & Information Technology, 2007, 29(7): 1772-1774. doi: 10.3724/SP.J.1146.2005.01623

Forgery Attack to a Group Signature Scheme

doi: 10.3724/SP.J.1146.2005.01623
  • Received Date: 2005-12-14
  • Rev Recd Date: 2006-06-20
  • Publish Date: 2007-07-19
  • Wang XM proposed a group signature scheme and claimed that it can resist all kinds of forgery attacks(2003). However,it was carefully analyzed, and there were defects in it: First, It cannot revoke group member effectively. Second,It cannot resist forgery attack.. In this paper, an effective attack scheme is proposed, and two factors that a secure group signature scheme should possess was given.
  • loading
  • [1] Lee W and Chang C. Efficient group signature scheme based on discrete logarithm[J].IEE Proc. Comput. Digital Techniques.1998, 145(1):15-18 [2] Tseng Y M and Jan J K. Improved group signature based on discrete logarithm problem[J].Electronics Letters.1999, 35(1):37-38 [3] Li Z C and Hui L C K, et al.. Security of Tseng-Jans group signature schemes[J].Information Processing Letters.2000, 75(5):187-189 [4] 王尚平, 王育民, 王晓峰等. 群签名中成员撤销问题的更新算子解决方案. 软件学报, 2003, 14(11): 1911-1917. Wang Shang-ping, Wang Yu-min, and Wang Xiao-feng, et al.. A new solution scheme for the member deletion problem in group signature by use of renew operator. Journal of Software, 2003, 14(11): 1911-1917. [5] Lysyanskaya J. Dynamic accumulators and application to efficient revocation of anonymous credentials. Advances in Cryptology-CRYPTO 2002, LNCS, Springer-Verlag, 2002, 2442: 61-76. [6] Kim H J, Lim J I, and Lee D H. Efficient and secure member deletion in group signature schemes. Information Security and Cryptology(ICISC 2000), LNCS, Springer-Verlag, 2001, 2015: 150-161. [7] 王晓明, 符方伟.一种安全的群签名方案[J].电子与信息学报.2003,25(5):657-663浏览 Wang Xiao-ming and Fu Fang-wei. A secure group signature scheme[J].Journal of Electronics Information Technology.2003, 25(5):657-663 [8] 黄振杰, 郝艳华, 王育民. 授权群签名. 电子学报, 2004, 32(5): 774-777. Huang Zhen-jie, Hao Yan-hua, and Wang Yu-min. Authorized group signature. Acta Electronica Sinica, 2004, 32(5): 774-777.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3889) PDF downloads(1424) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return