Cryptanalysis of two group signature schemes

Marc Joye, Seungjoo Kim, Narn Yih Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)


Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a signature. This paper analyzes the security of two group signature schemes recently proposed by Tseng and Jan. We show that both schemes are universally forgeable, that is, anyone (not necessarily a group member) is able to produce a valid group signature on an arbitrary message, which cannot be traced by the group authority.

Original languageEnglish
Title of host publicationInformation Security - 2nd International Workshop, ISW 1999, Proceedings
EditorsMasahiro Mambo, Yuliang Zheng
PublisherSpringer Verlag
Number of pages5
ISBN (Print)3540666958, 9783540666950
Publication statusPublished - 1999
Externally publishedYes
Event2nd International Information Security Workshop, ISW 1999 - Kuala Lumpur, Malaysia
Duration: 1999 Nov 61999 Nov 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other2nd International Information Security Workshop, ISW 1999
CityKuala Lumpur

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1999.


  • Cryptanalysis
  • Digital signatures
  • Group signatures
  • Universal forgeries

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Cryptanalysis of two group signature schemes'. Together they form a unique fingerprint.

Cite this