Improvements of generalization of threshold signature and authenticated encryption for group communications

被引:31
作者
Hsu, CL
Wu, WS [1 ]
Wu, TC
机构
[1] Huafan Univ, Dept Informat Management, Taipei 223, Taiwan
[2] Natl Taiwan Univ, Dept Informat Management, Taipei 106, Taiwan
关键词
threshold signature; threshold shared verification; authenticated encryption;
D O I
10.1016/S0020-0190(01)00189-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Wang et al. proposed a (t, n) threshold signature scheme with (k, l) threshold shared verification and a group-oriented authenticated encryption scheme with (k, l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the (k, l) threshold shared verification. Further, two improvements are proposed to eliminate the pointed out security leaks inherent in the original schemes. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:41 / 45
页数:5
相关论文
共 11 条
[1]  
DESMEDT Y, 1987, CRYPTO 87, P120
[2]  
DESMEDT Y, 1991, CRYPTO 91, P457
[3]   DIGITAL SIGNATURE WITH (T, N) SHARED VERIFICATION BASED ON DISCRETE LOGARITHMS [J].
HARN, L .
ELECTRONICS LETTERS, 1993, 29 (24) :2094-2095
[4]   GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05) :307-313
[5]  
HOSTER P, 1995, ELECTRON LETT, V31, P1137
[6]   AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION [J].
LEE, WB ;
CHANG, CC .
ELECTRONICS LETTERS, 1995, 31 (19) :1656-1657
[7]  
Lee WB, 1999, J INF SCI ENG, V15, P669
[8]  
LI CM, 1994, ADV CRYPTOLOGY EUROC, P194
[9]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]  
Wang CT, 2000, IEICE T FUND ELECTR, VE83A, P1228