Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability.
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.