English   español  
Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/12971
Compartir / Impacto:
Estadísticas
Add this article to your Mendeley library MendeleyBASE
Ver citas en Google académico
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL
Título

A weakness in authenticated encryption schemes based on Tseng et al.'s schemes

AutorHernández Encinas, Luis; Martín del Rey, Ángel; Muñoz Masqué, Jaime
Palabras claveAuthenticated encryption
Cryptanalysis
Cryptography
Digital signature
Self-certified public key
Fecha de publicación1-sep-2008
EditorFemto Technology
CitaciónInternational Journal of Network Security 7(2): 157-159 (2008)
ResumenTseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schemes avoiding some attacks against the original proposal. In this paper we show that there is a weakness on all these schemes affecting both the authentication of the signer's public key and the own security of the system. We propose a slight but necessary modification to these schemes in order to avoid that weakness.
Descripción3 pages, no figures.
Versión del editorhttp://ijns.femto.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p157-159.pdf
URIhttp://hdl.handle.net/10261/12971
ISSN1816-353X (Print)
1816-3548 (Online)
Aparece en las colecciones: (IFA) Artículos
Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
IJNS_HMM.pdf171,65 kBAdobe PDFVista previa
Visualizar/Abrir
Mostrar el registro completo
 


NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.