Improvement of Tseng et al.'s authenticated encryption scheme

被引:1
|
作者
Hwang, SJ [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, Taipei 251, Taiwan
关键词
authenticated encryption scheme; signature scheme; message recovery; cryptanalysis; self-certified public keys;
D O I
10.1016/j.amc.2004.04.042
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An attack is proposed to show that Tseng et al.'s authenticated encryption scheme is not secure enough to provide confidentiality for messages. So an improvement is also proposed. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 4
页数:4
相关论文
共 50 条
  • [31] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [32] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [33] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [34] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    [J]. Journal of Cryptology, 2024, 37
  • [35] Further improvement of Manik et al.'s remote user authentication scheme using smart cards
    Oh, Jai-Boo
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    [J]. FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2006 WORKSHOPS, PROCEEDINGS, 2006, 4331 : 57 - +
  • [36] Further analysis and improvement of Yoon et al.'s hash-based user authentication scheme
    Wang Bang-Ju
    Li Shu-Hua
    Zhang Huan-Guo
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 480 - +
  • [37] Security improvement on Chien et al.'s remote user authentication scheme using smart cards
    Duan, Xiaoyi
    Liu, JianWei
    Zhang, Qishan
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1133 - 1135
  • [38] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [39] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [40] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215