Improvement of Tseng et al.'s authenticated encryption scheme

被引:1
|
作者
Hwang, SJ [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Taipei 251, Taiwan
关键词
authenticated encryption scheme; signature scheme; message recovery; cryptanalysis; self-certified public keys;
D O I
10.1016/j.amc.2004.04.042
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An attack is proposed to show that Tseng et al.'s authenticated encryption scheme is not secure enough to provide confidentiality for messages. So an improvement is also proposed. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [1] Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
    Zhang, Z
    Araki, S
    Xiao, GZ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1475 - 1483
  • [2] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [3] Response to Tseng et al.
    Sarin, S. K.
    Kumar, Manoj
    Sharma, B. C.
    [J]. AMERICAN JOURNAL OF GASTROENTEROLOGY, 2007, 102 (07): : 1545 - 1545
  • [4] Cryptanalysis and improvement of Choie et al.'s authenticated key agreement protocols
    Wang, Shengbao
    Cao, Zhenfu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1371 - 1374
  • [5] Improvement on a threshold authenticated encryption scheme
    Tan, Zuowen
    [J]. Journal of Software, 2010, 5 (07) : 697 - 704
  • [6] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [7] Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    [J]. KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (2A): : 55 - 68
  • [8] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    [J]. Journal of Harbin Institute of Technology(New series), 2007, (01) : 26 - 28
  • [9] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [10] An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols
    Kim, Mijin
    Kwon, Changyoung
    Won, Dongho
    [J]. WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 259 - +