1 research outputs found

    Cryptanalysis of an ID-based Deniable Threshold Ring Authentication

    No full text
    [[abstract]]In this paper, we offer analysis of a deniable threshold ring authentication protocol proposed by Jin et al. [5]. The Authors in [5] combined the two concepts, namely, threshold ring signature and deniable authentication, to propose a non-interactive deniable (t, n)threshold ring authentication protocol. The protocol is the first design of this type. We will point out that this protocol cannot guarantee that at least t legal participates generate a valid signature and cannot withstand message modification attacks under certain restrictions
    corecore