Cryptanalysis of Tseng et al.'s authenticated encryption schemes

被引:0
|
作者
Qi, X [1 ]
Xiu, YY
机构
[1] Hangzhou Teachers Coll, Sch Informat & Engn, Hangzhou 310012, Zhejiang, Peoples R China
[2] Zhejiang Univ, Dept Math, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; authenticated encryption; message linkage; self-certified public key;
D O I
10.1016/j.amc.2003.08.084
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 2003, Tseng et al. proposed two types of authenticated encryption schemes with message recovery using self-certified public keys. One is suitable for the short message. To the large message, they proposed the other authenticated encryption scheme with message linkages for message flows. An attack is proposed to show that the Tseng et al.'s schemes are not secure in the following cases, which the specified verifier substitutes his secret key, or the signer generates the signature with these schemes for two or more specified verifiers. A small modification to their schemes can satisfy the security requirement. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [21] Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles
    Lee, Hyung Tae
    IEEE ACCESS, 2023, 11 : 84533 - 84542
  • [22] Cryptanalysis of Kim et al's two password authentication schemes
    Li, Jiping
    Xiong, Zenggang
    Ding, Yaoming
    Liu, Shouyin
    Information Technology Journal, 2013, 12 (18) : 4513 - 4516
  • [23] A survey analyzing encryption schemes for IoT security measuresA survey analyzing encryption schemes for IoT security...S. Dhiman et al.
    Shalini Dhiman
    Sumitra Nayak
    Ganesh Kumar Mahato
    Swarnendu Kumar Chakraborty
    The Journal of Supercomputing, 81 (6)
  • [24] Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme
    Li, Huixian
    Pang, Liaojun
    IET INFORMATION SECURITY, 2014, 8 (01) : 8 - 11
  • [25] Cryptanalysis of Barni et al. watermarking scheme
    Das, TK
    Zhou, JY
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
  • [26] Cryptanalysis of Chang et al.'s signature scheme with message recovery
    Zhang, FG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 358 - 359
  • [27] Making searchable symmetric encryption schemes smaller and fasterMaking searchable symmetric encryption schemes smaller and fasterD. Chakraborty et al.
    Debrup Chakraborty
    Avishek Majumder
    Subhabrata Samajder
    International Journal of Information Security, 2025, 24 (1)
  • [28] The Cryptanalysis of Yuan et al.’s Multiparty Quantum Secret Sharing Protocol
    Kejia Zhang
    Sujuan Qin
    International Journal of Theoretical Physics, 2013, 52 : 3953 - 3959
  • [29] Cryptanalysis and improvement of Q. Peng et al.'s PVSS scheme
    Biswas, Anindya Kumar
    Dasgupta, Mou
    Ray, Sangram
    CRYPTOLOGIA, 2024, 48 (04) : 291 - 304
  • [30] The Cryptanalysis of Yuan et al.'s Multiparty Quantum Secret Sharing Protocol
    Zhang, Kejia
    Qin, Sujuan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (11) : 3953 - 3959