The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pada tahun 2000, Wang et al. mencadangkan yang baru (t,n) skim tandatangan ambang dengan (k,l) pengesahan perkongsian ambang. Sementara itu, mengintegrasikan idea pemulihan mesej, mereka juga mencadangkan satu (t,n) ambang skim penyulitan disahkan dengan (k,l) pengesahan perkongsian ambang. Walau bagaimanapun, artikel ini akan menunjukkan bahawa kedua-dua skim yang dicadangkan adalah tidak selamat, kerana mana-mana penyerang berniat jahat boleh mendapatkan kunci rahsia kumpulan daripada dua tandatangan ambang yang sah. Oleh itu, penyerang hanya boleh memalsukan atau mengesahkan tandatangan ambang. Penambahbaikan untuk mengatasi serangan dicadangkan.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Yuh-Min TSENG, Jinn-Ke JAN, Hung-Yu CHIEN, "On the Security of Generalization of Threshold Signature and Authenticated Encryption" in IEICE TRANSACTIONS on Fundamentals,
vol. E84-A, no. 10, pp. 2606-2609, October 2001, doi: .
Abstract: In 2000, Wang et al. proposed a new (t,n) threshold signature scheme with (k,l) threshold shared verification. Meanwhile, integrating the idea of message recovery, they also proposed a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. However, this article will show that both proposed schemes are insecure, because any malicious attacker can obtain the group secret keys from two valid threshold signatures. Thus, the attacker may solely forge or verify a threshold signature. An improvement to overcome the attacks is proposed.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e84-a_10_2606/_p
Salinan
@ARTICLE{e84-a_10_2606,
author={Yuh-Min TSENG, Jinn-Ke JAN, Hung-Yu CHIEN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On the Security of Generalization of Threshold Signature and Authenticated Encryption},
year={2001},
volume={E84-A},
number={10},
pages={2606-2609},
abstract={In 2000, Wang et al. proposed a new (t,n) threshold signature scheme with (k,l) threshold shared verification. Meanwhile, integrating the idea of message recovery, they also proposed a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. However, this article will show that both proposed schemes are insecure, because any malicious attacker can obtain the group secret keys from two valid threshold signatures. Thus, the attacker may solely forge or verify a threshold signature. An improvement to overcome the attacks is proposed.},
keywords={},
doi={},
ISSN={},
month={October},}
Salinan
TY - JOUR
TI - On the Security of Generalization of Threshold Signature and Authenticated Encryption
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2606
EP - 2609
AU - Yuh-Min TSENG
AU - Jinn-Ke JAN
AU - Hung-Yu CHIEN
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E84-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2001
AB - In 2000, Wang et al. proposed a new (t,n) threshold signature scheme with (k,l) threshold shared verification. Meanwhile, integrating the idea of message recovery, they also proposed a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. However, this article will show that both proposed schemes are insecure, because any malicious attacker can obtain the group secret keys from two valid threshold signatures. Thus, the attacker may solely forge or verify a threshold signature. An improvement to overcome the attacks is proposed.
ER -