The security of the improvement on the generalization of threshold signature and authenticated encryption

被引:0
|
作者
Lee, NY [1 ]
机构
[1] So Taiwan Univ Technol, Informat Management Dept, Tainan 710, Taiwan
关键词
cryptography; threshold signature; group-oriented cryptography; authenticated encryption; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wang et al., in 2000, proposed a generalized group-oriented threshold signature scheme and a generalized authenticated encryption scheme with shared verification. Tseng et al., in 2001, showed that both schemes are insecure; because any attacker is able to reveal the group secret keys from two previously valid threshold signatures. They further presented two improvements on Wang et al.'s schemes to against the attacks. Unfortunately, this paper will show that the improved schemes are still breakable.
引用
收藏
页码:2364 / 2367
页数:4
相关论文
共 50 条
  • [1] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [2] On the security of generalization of threshold signature and authenticated encryption
    Tseng, Yuh-Min
    Jan, Jinn-Ke
    Chien, Hung-Yu
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2606 - 2609
  • [3] Security notes on generalization of threshold signature and authenticated encryption
    Wang, Shuhong
    Wang, Guilin
    Bao, Feng
    Wang, Jie
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004, E87-A (12) : 3443 - 3446
  • [4] Security notes on generalization of threshold signature and authenticated encryption
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (12): : 3443 - 3446
  • [5] Generalization of threshold signature and authenticated encryption for group communications
    Wang, CT
    Chang, CC
    Lin, CH
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (06) : 1228 - 1237
  • [6] Cryptanalysis on generalization of threshold signature and authenticated encryption for group communications
    Zhang, Honglie
    Zhang, Guoyin
    Li, Jiguo
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 665 - +
  • [7] Improvements of generalization of threshold signature and authenticated encryption for group communications
    Hsu, CL
    Wu, WS
    Wu, TC
    [J]. INFORMATION PROCESSING LETTERS, 2002, 81 (01) : 41 - 45
  • [8] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    [J]. Journal of Software, 2010, 5 (07) : 697 - 704
  • [9] Improvements of Threshold Signature and Authenticated Encryption for Group Communications
    Hwang, Min-shiang
    Chang, Tingyi
    Yang, Chengying
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [10] Threshold authenticated encryption scheme using labor-division signature
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Chen, Tzer Shyong
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 300 - 304