Cryptanalysis of Tseng et al.'s authenticated encryption schemes

被引:0
|
作者
Qi, X [1 ]
Xiu, YY
机构
[1] Hangzhou Teachers Coll, Sch Informat & Engn, Hangzhou 310012, Zhejiang, Peoples R China
[2] Zhejiang Univ, Dept Math, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; authenticated encryption; message linkage; self-certified public key;
D O I
10.1016/j.amc.2003.08.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2003, Tseng et al. proposed two types of authenticated encryption schemes with message recovery using self-certified public keys. One is suitable for the short message. To the large message, they proposed the other authenticated encryption scheme with message linkages for message flows. An attack is proposed to show that the Tseng et al.'s schemes are not secure in the following cases, which the specified verifier substitutes his secret key, or the signer generates the signature with these schemes for two or more specified verifiers. A small modification to their schemes can satisfy the security requirement. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [41] Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol
    Choi, Sung-Bae
    Yoon, Eun-Jun
    INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 187 - 191
  • [42] Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
    Jiang, Qi
    Ma, Jianfeng
    Tian, Youliang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1340 - 1351
  • [43] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [44] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Shin, Jungpil
    Wang, Kun-hao
    2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
  • [45] Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card
    Chen, Chin-Ling
    Deng, Yong-Yuan
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION (ICASI), 2016,
  • [46] Cryptanalysis of Zheng et al.'s Pairing-free Secure IBE Scheme
    Karati, Arijit
    Biswas, G. P.
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 101 - 106
  • [47] Cryptanalysis and improvement of barman et al.’s secure remote user authentication scheme
    Patel, Chintan
    Doshi, Nishant
    International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 604 - 610
  • [48] Cryptanalysis of Chen et al.'s multi-secret visual cryptography scheme
    Yang, C-N
    Chung, T-H
    IMAGING SCIENCE JOURNAL, 2013, 61 (03): : 334 - 340
  • [49] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Rangan, C. Pandu
    Jain, Neha
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
  • [50] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619