Cryptanalysis of Tseng et al.'s authenticated encryption schemes

被引:0
|
作者
Qi, X [1 ]
Xiu, YY
机构
[1] Hangzhou Teachers Coll, Sch Informat & Engn, Hangzhou 310012, Zhejiang, Peoples R China
[2] Zhejiang Univ, Dept Math, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; authenticated encryption; message linkage; self-certified public key;
D O I
10.1016/j.amc.2003.08.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2003, Tseng et al. proposed two types of authenticated encryption schemes with message recovery using self-certified public keys. One is suitable for the short message. To the large message, they proposed the other authenticated encryption scheme with message linkages for message flows. An attack is proposed to show that the Tseng et al.'s schemes are not secure in the following cases, which the specified verifier substitutes his secret key, or the signer generates the signature with these schemes for two or more specified verifiers. A small modification to their schemes can satisfy the security requirement. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [1] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4
  • [2] Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
    Zhang, Z
    Araki, S
    Xiao, GZ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1475 - 1483
  • [3] Cryptanalysis of Lee et al.'s authenticated group key agreement
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [4] Cryptanalysis and improvement of Choie et al.'s authenticated key agreement protocols
    Wang, Shengbao
    Cao, Zhenfu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1371 - 1374
  • [5] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
  • [6] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [7] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [8] Response to Tseng et al.
    Sarin, S. K.
    Kumar, Manoj
    Sharma, B. C.
    AMERICAN JOURNAL OF GASTROENTEROLOGY, 2007, 102 (07): : 1545 - 1545
  • [9] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
    Li, Xiaoqian
    Wang, Peng
    Li, Bao
    Sun, Zhelei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
  • [10] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Moon, Sangjae
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +