Security Notes on Generalization of Threshold Signature and Authenticated Encryption(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In 2000, Wang et al. proposed a (t,n) threshold signature scheme with (k, l) threshold shared verification, and a (t, n) threshold authenticated encryption scheme with (k, l) threshold shared verification. Later, Tseng et al. mounted some attacks against Wang et al.'s schemes. At the same, they also presented the improvements. In this paper, we first point out that Tseng et al.'s attacks are actually invalid due to their misunderstanding of Wang et al.'s Schemes. Then, we show that both Wang et al.'s schemes and Tseng et al.'s improvements are indeed insecure by demonstrating several effective attacks.
- 社団法人電子情報通信学会の論文
- 2004-12-01
著者
-
Bao F
National Univ. Sinpapore Singapore
-
Wang J
National Science Foundation Of China 83 Shuangqing Road
-
WANG Shuhong
School of Information Systems, Singapore Management University
-
BAO Feng
Institute for Infocomm Research, 21 Heng Mui Keng Terrace
-
WANG Guilin
Institute for Infocomm Research
-
WANG Jie
School of Mathematical Sciences, Peking University
-
Bao Feng
Institute For Infocomm Research
-
Wang Shuhong
School Of Information Systems Singapore Management University
-
Wang Jie
School Of Mathematical Sciences Peking University
関連論文
- A More Efficient Improvement of the Virtual Software Token Protocols (Fundamental Theories for Communications)
- Security Notes on Generalization of Threshold Signature and Authenticated Encryption(Information Security)
- Optimal Time Broadcasting Schemes in Faulty Star Graphs (Special Section on Discrete Mathematics and Its Applications)
- Reliable Broadcasting and Secure Distributing in Channel Networks(Special Section on Discrete Mathematics and Its Applications)
- Independent Spanning Trees of Product Graphs and Their Construction
- Independent Spanning Trees of Product Graphs and Their Construction
- Nonadaptive Fault-Tolerant File Transmission in Rotator Graphs (Special Section on Discrete Mathematics and Its Applications)
- Broadcasting in Hypercubes with Randomly Distributed Byzantine Faults
- Broadcasting in Hypercubes with Randamly Distributed Byzantine Faults
- Time-Bound Hierarchical Key Assignment : An Overview
- Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange(Fundamental Theories for Communications)