Loading…

Improvements of generalization of threshold signature and authenticated encryption for group communications

Recently, Wang et al. proposed a ( t, n) threshold signature scheme with ( k, l) threshold shared verification and a group-oriented authenticated encryption scheme with ( k, l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the ( k, l)...

Full description

Saved in:
Bibliographic Details
Published in:Information processing letters 2002-01, Vol.81 (1), p.41-45
Main Authors: Hsu, Chien-Lung, Wu, Tzong-Sun, Wu, Tzong-Chen
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recently, Wang et al. proposed a ( t, n) threshold signature scheme with ( k, l) threshold shared verification and a group-oriented authenticated encryption scheme with ( k, l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the ( k, l) threshold shared verification. Further, two improvements are proposed to eliminate the pointed out security leaks inherent in the original schemes.
ISSN:0020-0190
1872-6119
DOI:10.1016/S0020-0190(01)00189-2