×
In this paper, we demonstrate five effective attacks on their schemes: four of them are insider universal forgeries, in which one dishonest member (maybe ...
In this paper, we analyze the security of the Lee-Hwang schemes [12] and demonstrate five attacks. ... Section 2 reviews two Lee-. Hwang group-oriented undeniable ...
In this paper, we demonstrate five effective attacks on their schemes: four of them are insider universal forgeries, in which one dishonest member (maybe ...
In this paper, we demonstrate five effective attacks on their schemes: four of them are insider universal forgeries, in which one dishonest member (maybe ...
Five effective attacks on the Lee-Hwang undeniable signature schemes are demonstrated: four of them are insider universal forgeries, in which one dishonest ...
In 1999, Lee and Hwang presented two group-oriented undeniable signature schemes with a trusted center. Their schemes are natural generalizations of Chaum's ...
At Auscrypt '92, Harn and Yang firstly proposed the concept of group-oriented undeniable signature. Two threshold undeniable signature schemes were devised ...
In this paper, we first present a definition of threshold group signatures, and propose several requirements to evaluate whether a threshold group signature ...
Unfortunately, there are some security weaknesses in Lee-Hwang's schemes. Their schemes assume that the signers and verifier should honestly perform steps ...
Five attacks on the Lee-Hwang undeniable signature schemes are demonstrated: four of them are universal forgery, in which one dishonest member can get a ...