Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2005, Vol. 6 Issue (10): 1-    DOI: 10.1631/jzus.2005.A1011
    
Colluding attacks on a group signature scheme
GUO Xing-yang, TANG Chao-jing
School of Electronic Science and Engineering, National University of Defense Technology, Hunan 410073, China; School of Telecommunication Engineering, Air Force Engineering University, Xi’an 710077, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure. We show that some parameters should be carefully selected in the scheme to resist our attacks.

Key wordsGroup signature      Colluding attack      Factoring problem     
Received: 10 June 2005     
CLC:  TP309  
Cite this article:

GUO Xing-yang, TANG Chao-jing. Colluding attacks on a group signature scheme. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(10): 1-.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2005.A1011     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2005/V6/I10/1

[1] XIE Qi, YU Xiu-yuan. A novel group signature with one time secret key[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(6): 560-564.
[2] GAN Yuan-ju. Verifiable threshold signature schemes against conspiracy attack[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 50-54.