期刊文献+

基于群组通信的通用阈值签名和鉴别加密技术分析

Cryptanalysis on generalization of threshold signature and authenticated encryption for group communications
下载PDF
导出
摘要 针对Wang等人提出的基于群组通信的通用阈值签名以及鉴别加密技术(W-C-L方案),从两方面证明了该方案的不可靠性:首先,W-C-L不能抵制住他们所声称的方程攻击;其次,W-C-L不是一个真正的门限共享验证。针对最近Tseng等人提出的基于W-C-L的改进算法(T-J-C方案),说明了该方法也会遭受方程攻击。 The generalization of threshold signature and authenticated encryption for group communications (denoted as W-C-L scheme) proposed by Wang et al suffers from two instability. One instability is shown by the failure of W-C-L scheme to withstand equation attack as they claimed. The other is shown by the failure of W-C-L scheme to act as the real threshold shared verification. An improved scheme (denoted as T-J-C scheme) on W-C-L scheme recently proposed by Tseng et al also suffers from equation attack.
出处 《黑龙江科技学院学报》 CAS 2004年第2期106-109,共4页 Journal of Heilongjiang Institute of Science and Technology
关键词 阈值签名 鉴别加密 密码分析 加密技术 threshold signature authenticated encryption cryptanalysis cryptography
  • 相关文献

参考文献12

  • 1NYBERG K, RUEPPEL R A. Message recovery for signature schemes based on discrete logarithm problem [ J ]. Advances in Cryptology-Crypto'94, LNCS, Springer-Verlag, 1995. 182-193.
  • 2HSU C L, WU T C. Authenticated encryption scheme with (t,n) shared verification[J]. IEE.-Computer Digital Technology,1998, 145(2): 117-120.
  • 3WANG C T, CHANG C C, LIN C H. Generalization of threshold signature and authenticated encryption for group communications [J]. IEICE Trans. Fundamentals, 2000, E83-A ( 6 ): 1 228-1 236.
  • 4TSENG Y M, JAN J K, CHIEN H Y. On the security of generalization of threshold signature and authenticated encryption [J]. IEICE Trans. Fundamentals, 2001, E84-A ( 10): 2606-2609.
  • 5NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem [J]. Designs Codes and Cryptography, 1996, 7(1-2): 61-81.
  • 6MIYAJI A. Another countermeasure to forgeries over message recovery signature [J]. IEICE Trans Fundamentals, 1997,E80-A(11): 2 191-2 200.
  • 7HOSTER P, MICHELS M, PETERSON H. Digital signature with (t,n) shared verification based on discrete logarithms [J] .Electron. Lett., 1995, 31(14): 1 137.
  • 8LEE W B, CHANG C C. Authenticated encryption scheme without using a one-way function [J]. Electron. Lett., 1995,31(19): 1 656-1 657.
  • 9DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures[J].Advances in Cryptology-Crypto 91, SpringerVerlag, 1991. 457-469.
  • 10HARN L. Digital signature with (t,n) shared verification based on discrete logarithms[J]. Electron. Lett, 1993, 29(24): 2094-2 095.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部