{"title":"具有欺诈者识别的Lin和Wu不可否认(t, n)阈值签名方案的密码分析","authors":"Yankai Lin, Yi-Fan Tseng","doi":"10.1109/ISPACS51563.2021.9651014","DOIUrl":null,"url":null,"abstract":"In this manuscript, we show the weakness of the undenialbe (t, n)-threshold signature scheme with cheater identification proposed by Lin and Wu. In our attack method, if cheater in the signer group is able to violate the correctness of the signature without being identified.","PeriodicalId":359822,"journal":{"name":"2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification\",\"authors\":\"Yankai Lin, Yi-Fan Tseng\",\"doi\":\"10.1109/ISPACS51563.2021.9651014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this manuscript, we show the weakness of the undenialbe (t, n)-threshold signature scheme with cheater identification proposed by Lin and Wu. In our attack method, if cheater in the signer group is able to violate the correctness of the signature without being identified.\",\"PeriodicalId\":359822,\"journal\":{\"name\":\"2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)\",\"volume\":\"132 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPACS51563.2021.9651014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPACS51563.2021.9651014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification
In this manuscript, we show the weakness of the undenialbe (t, n)-threshold signature scheme with cheater identification proposed by Lin and Wu. In our attack method, if cheater in the signer group is able to violate the correctness of the signature without being identified.