The security of the improvement on the generalization of threshold signature and authenticated encryption

被引:0
|
作者
Lee, NY [1 ]
机构
[1] So Taiwan Univ Technol, Informat Management Dept, Tainan 710, Taiwan
关键词
cryptography; threshold signature; group-oriented cryptography; authenticated encryption; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wang et al., in 2000, proposed a generalized group-oriented threshold signature scheme and a generalized authenticated encryption scheme with shared verification. Tseng et al., in 2001, showed that both schemes are insecure; because any attacker is able to reveal the group secret keys from two previously valid threshold signatures. They further presented two improvements on Wang et al.'s schemes to against the attacks. Unfortunately, this paper will show that the improved schemes are still breakable.
引用
下载
收藏
页码:2364 / 2367
页数:4
相关论文
共 50 条
  • [21] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    Int. J. Secur. Netw., 2013, 4 (194-199):
  • [22] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [23] Authenticated encryption and steganography in unconditional security setting
    Matsumoto, T
    Shikata, J
    2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6
  • [24] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [25] Security Analysis of Two Authenticated Encryption Schemes
    Zhang, Jianhong
    Geng, Qin
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
  • [26] Modeling Memory Faults in Signature and Authenticated Encryption Schemes
    Fischlin, Marc
    Gunther, Felix
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 56 - 84
  • [27] On the security of joint signature and encryption
    An, JH
    Dodis, Y
    Rabin, T
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 83 - 107
  • [28] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    Journal of Harbin Institute of Technology(New series), 2007, (01) : 26 - 28
  • [29] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [30] Authenticated encryption schemes with message linkage for threshold signatures
    Huang, CH
    Lee, CY
    Lin, CH
    Chang, CC
    Chen, KL
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 261 - 264