The security of the improvement on the generalization of threshold signature and authenticated encryption

被引:0
|
作者
Lee, NY [1 ]
机构
[1] So Taiwan Univ Technol, Informat Management Dept, Tainan 710, Taiwan
关键词
cryptography; threshold signature; group-oriented cryptography; authenticated encryption; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wang et al., in 2000, proposed a generalized group-oriented threshold signature scheme and a generalized authenticated encryption scheme with shared verification. Tseng et al., in 2001, showed that both schemes are insecure; because any attacker is able to reveal the group secret keys from two previously valid threshold signatures. They further presented two improvements on Wang et al.'s schemes to against the attacks. Unfortunately, this paper will show that the improved schemes are still breakable.
引用
下载
收藏
页码:2364 / 2367
页数:4
相关论文
共 50 条
  • [31] Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 705 - 735
  • [32] Security analysis and improvement of a (t, n) threshold proxy signature scheme
    Kong, Fanyu
    Yu, Jia
    Qin, Baodong
    Li, Ming
    Li, Daxing
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 923 - +
  • [33] Provable-security analysis of authenticated encryption in Kerberos
    Boldyreva, A.
    Kumar, V.
    IET INFORMATION SECURITY, 2011, 5 (04) : 207 - 219
  • [34] Authenticated encryption mode for beyond the birthday bound security
    Iwata, Tetsu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +
  • [35] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [36] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [37] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [38] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [39] Digital signature with message recovery and authenticated encryption (Signcryption) - A comparison
    Yeun, CY
    CRYPTOGRAPHY AND CODING, 1999, 1746 : 307 - 312
  • [40] On the Joint Security of Encryption and Signature, Revisited
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    Stam, Martijn
    Thomson, Susan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 161 - +