Loading…
Improvements of generalization of threshold signature and authenticated encryption for group communications
Recently, Wang et al. proposed a ( t, n) threshold signature scheme with ( k, l) threshold shared verification and a group-oriented authenticated encryption scheme with ( k, l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the ( k, l)...
Saved in:
Published in: | Information processing letters 2002-01, Vol.81 (1), p.41-45 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Recently, Wang et al. proposed a (
t,
n) threshold signature scheme with (
k,
l) threshold shared verification and a group-oriented authenticated encryption scheme with (
k,
l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the (
k,
l) threshold shared verification. Further, two improvements are proposed to eliminate the pointed out security leaks inherent in the original schemes. |
---|---|
ISSN: | 0020-0190 1872-6119 |
DOI: | 10.1016/S0020-0190(01)00189-2 |