In 2000, Wang et al. proposed a (t,n) threshold signature scheme with (k,l) threshold shared verification, and a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. Later, Tseng et al. mounted some attacks against Wang et al.'s schemes. At the same, they also presented the improvements. In this paper, we first point out that Tseng et al.'s attacks are actually invalid due to their misunderstanding of Wang et al.'s Schemes. Then, we show that both Wang et al.'s schemes and Tseng et al.'s improvements are indeed insecure by demonstrating several effective attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Shuhong WANG, Guilin WANG, Feng BAO, Jie WANG, "Security Notes on Generalization of Threshold Signature and Authenticated Encryption" in IEICE TRANSACTIONS on Fundamentals,
vol. E87-A, no. 12, pp. 3443-3446, December 2004, doi: .
Abstract: In 2000, Wang et al. proposed a (t,n) threshold signature scheme with (k,l) threshold shared verification, and a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. Later, Tseng et al. mounted some attacks against Wang et al.'s schemes. At the same, they also presented the improvements. In this paper, we first point out that Tseng et al.'s attacks are actually invalid due to their misunderstanding of Wang et al.'s Schemes. Then, we show that both Wang et al.'s schemes and Tseng et al.'s improvements are indeed insecure by demonstrating several effective attacks.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e87-a_12_3443/_p
Copy
@ARTICLE{e87-a_12_3443,
author={Shuhong WANG, Guilin WANG, Feng BAO, Jie WANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security Notes on Generalization of Threshold Signature and Authenticated Encryption},
year={2004},
volume={E87-A},
number={12},
pages={3443-3446},
abstract={In 2000, Wang et al. proposed a (t,n) threshold signature scheme with (k,l) threshold shared verification, and a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. Later, Tseng et al. mounted some attacks against Wang et al.'s schemes. At the same, they also presented the improvements. In this paper, we first point out that Tseng et al.'s attacks are actually invalid due to their misunderstanding of Wang et al.'s Schemes. Then, we show that both Wang et al.'s schemes and Tseng et al.'s improvements are indeed insecure by demonstrating several effective attacks.},
keywords={},
doi={},
ISSN={},
month={December},}
Copy
TY - JOUR
TI - Security Notes on Generalization of Threshold Signature and Authenticated Encryption
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 3443
EP - 3446
AU - Shuhong WANG
AU - Guilin WANG
AU - Feng BAO
AU - Jie WANG
PY - 2004
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E87-A
IS - 12
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - December 2004
AB - In 2000, Wang et al. proposed a (t,n) threshold signature scheme with (k,l) threshold shared verification, and a (t,n) threshold authenticated encryption scheme with (k,l) threshold shared verification. Later, Tseng et al. mounted some attacks against Wang et al.'s schemes. At the same, they also presented the improvements. In this paper, we first point out that Tseng et al.'s attacks are actually invalid due to their misunderstanding of Wang et al.'s Schemes. Then, we show that both Wang et al.'s schemes and Tseng et al.'s improvements are indeed insecure by demonstrating several effective attacks.
ER -