Cryptanalysis of Publicly Verifiable Authenticated Encryption(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Recently, Ma and Chen proposed a new authenticated encryption scheme with public verifiability. The signer can generate a signature with message recovery for a specified recipient. With a dispute, the recipient has ability to convert the signature into an ordinary one that can be verified by anyone without divulging her/his private key and the message. However, we point out that any adversary can forge a converted signature in this article.
- 社団法人電子情報通信学会の論文
- 2004-06-01
著者
-
Yang Chou-chen
Department Of Management Information System National Chung Hsing University
-
Yang C‐c
National Taiwan Univ. Sci. And Technol. Taipei Twn
-
Chang Ting-yi
Department Of Computer And Information Science National Chiao Tung University
-
Hwang Min-Shiang
Department of Computer and Information Science, National Chiao Tung University
-
Hwang M‐s
Department Of Management Information System National Chung Hsing University
-
Hwang Min-shiang
Department Of Computer And Information Science National Chiao Tung University:directorate General Of
関連論文
- Traceability on Low-Computation Partially Blind Signatures for Electronic Cash
- Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines(Terrestrial Radio Communications)
- A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp
- Security Enhancement for Protecting Password Transmission(Fundamental Theories)
- Traceability on Stadler et al.'s Fair Blind Signature Scheme
- Cryptanalysis of Simple Authenticated Key Agreement Protocols(Information Security)
- Cryptanalysis of Publicly Verifiable Authenticated Encryption(Information Security)
- Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows(Application Information Security)
- An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
- A Secure LITESET Scheme(Application Information Security)
- Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks(Fundamental Theories for Communications)