On the Security of Generalization of Threshold Signature and Authenticated Encryption
スポンサーリンク
概要
- 論文の詳細を見る
In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) threshold shared verification. Meanwhile, integrating the idea of message recovery, they also proposed a (t, n) threshold authenticated encryption scheme with (k, l) threshold shared verification. However, this article will show that both proposed schemes are insecure, because any malicious attacker can obtain the group secret keys from two valid threshold signatures. Thus, the attacker may solely forge or verify a threshold signature. An improvement to overcome the attacks is proposed.
- 社団法人電子情報通信学会の論文
- 2001-10-01
著者
-
Jan J‐k
The Institute Of Applied Mathematics National Chung Hsing University
-
Tseng Y‐m
Chao Yang Univ. Technol. Taichung County Twn
-
TSENG Yuh-Min
the Department of Information Management, Nan-Kai College of Technology and Commerce
-
JAN Jinn-Ke
the Institute of Applied Mathematics, National Chung Hsing University
-
CHIEN Hung-Yu
the Institute of Applied Mathematics, National Chung Hsing University
-
Chien Hung-yu
The Institute Of Applied Mathematics National Chung Hsing University
関連論文
- On the Security of Generalization of Threshold Signature and Authenticated Encryption
- A Practical (t, n) Multi-Secret Sharing Scheme