ATTACK AND IMPROVE THE ZHAO-LIU AUTHENTICATED ENCRYPTION SCHEME

被引:0
|
作者
Chang, Ting-Yi [1 ]
Chiang, Mao-Lun [2 ]
机构
[1] Natl Changhua Univ Educ, Grad Inst Learning E, Changhua, Taiwan
[2] Tzu Chi Coll Technol, Dept Informat Engn & Informat, Hualien 970, Taiwan
关键词
Authenticated encryption; Digital signature; Elliptic curve cryptosystem; Universal forgery attack; LIMITED VERIFIER SIGNATURE; MESSAGE LINKAGES; CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we show that the Zhao-Liu authenticated encryption scheme is vulnerable to a universal forgery attack. This one malicious verifier is able to use previous signatures to forge the signer's authenticated encryption signature on any message. Two simple methods are presented to withstand this attack. One method also additionally provides the convertible property in the Zhao-Liu authenticated encryption scheme, which allows the verifier to convert the signature into an ordinary one. The converted signature can be verified by anyone, without revealing his/her secret key.
引用
收藏
页码:3025 / 3030
页数:6
相关论文
共 50 条
  • [1] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
    Khovratovich, Dmitry
    Rechberger, Christian
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184
  • [2] Attack on Liu/Farrell/Boyd arithmetic coding encryption scheme
    Uehara, T
    Safavi-Naini, R
    [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 273 - 287
  • [3] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [4] Authenticated public key broadcast encryption scheme secure against insiders' attack
    Park, Chanil
    Hur, Junbeom
    Hwang, Seongoun
    Yoon, Hyunsoo
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 113 - 122
  • [5] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [6] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [7] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [8] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [9] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [10] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    [J]. Journal of Cryptology, 2024, 37