Cryptanalysis of Tseng et al.'s authenticated encryption schemes

被引:0
作者
Qi, X [1 ]
Xiu, YY
机构
[1] Hangzhou Teachers Coll, Sch Informat & Engn, Hangzhou 310012, Zhejiang, Peoples R China
[2] Zhejiang Univ, Dept Math, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; authenticated encryption; message linkage; self-certified public key;
D O I
10.1016/j.amc.2003.08.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2003, Tseng et al. proposed two types of authenticated encryption schemes with message recovery using self-certified public keys. One is suitable for the short message. To the large message, they proposed the other authenticated encryption scheme with message linkages for message flows. An attack is proposed to show that the Tseng et al.'s schemes are not secure in the following cases, which the specified verifier substitutes his secret key, or the signer generates the signature with these schemes for two or more specified verifiers. A small modification to their schemes can satisfy the security requirement. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 6 条
[1]  
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]   Cryptanalysis and improvement of Petersen-Michels signcryption scheme [J].
He, WH ;
Wu, TC .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (02) :123-124
[3]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[4]  
Nyberg K., 1996, Designs, Codes and Cryptography, V7, P61, DOI 10.1007/BF00125076
[5]  
Tseng YM, 2003, APPL MATH COMPUT, V136, P203, DOI 10.1016/S0096-3003(02)00010-3
[6]   Convertible authenticated encryption scheme [J].
Wu, TS ;
Hsu, CL .
JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) :205-209