Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem

被引:0
作者
Hsu, CL [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
关键词
authenticated encryption scheme; message recovery; cryptanalysis; elliptic curve;
D O I
10.1016/j.amc.2004.06.121
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Tzeng and Hwang proposed an authenticated encryption scheme based on elliptic curve discrete logarithm problem. In such a scheme, the signer can sign a message for a designated verifier and only the designated verifier can retrieve and verify the message from the generated signature. This paper, however, will demonstrate an attack on the Tzeng-Hwang scheme that an adversary intercepting any signature transmitted between the signer and the designated verifier can recover the corresponding signed message, provided that one verified message is released. Finally, we improve the Tzeng-Hwang scheme to counter the proposed attack and achieve the security requirements of an authenticated encryption scheme. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:882 / 890
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 1998, 148883 ISOIEC
[2]  
[Anonymous], 2000, P1363 IEEE
[3]   ElGamal-like digital signature and multisignature schemes using self-certified public keys [J].
Chang, YS ;
Wu, TC ;
Huang, SC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2000, 50 (02) :99-105
[4]  
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490
[5]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[6]   Authenticated encryption schemes with message linkage [J].
Hwang, SJ ;
Chang, CC ;
Yang, WP .
INFORMATION PROCESSING LETTERS, 1996, 58 (04) :189-194
[7]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[8]   Authenticated encryption schemes with linkage between message blocks [J].
Lee, WB ;
Chang, CC .
INFORMATION PROCESSING LETTERS, 1997, 63 (05) :247-250
[9]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[10]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426