Security Analysis of Digital Signature Scheme with Message Recovery using SelfCertified Public Keys
Abstract
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using selfcertified public keys. Their schemes have two fundamental properties. Only the intended receiver can recover the message while verifying the signature, and each user can use his own private key independently without system authority learning about it. This paper presents maninthemiddle attacks to both Tseng and his colleagues authenticated encryption variants. It will be shown that these schemes are not secure against this attack.
Keywords
Full Text:
PDFReferences
Y.H. Chen and J.K. Jan. “An authenticated encryption scheme for securely signing a signature with message linkages”, International Conference on Innovative Computing, Information and Control, pp. 7780, 2007.
T. ElGamal. “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Inform Theory 31 (4), pp. 469472, 1985.
L. H. Encinas and A.M Rey and J.M. Masque. “A Weakness in Authenticated Encryption Schemes Based on Tseng et al.’s schemes”, vol. 7, no. 2, pp. 185187, 2008.
M. Girault. “Selfcertified public keys”, Advances in CryptologyEUROCRYPT’91, Springer, Berlin, 1991, pp. 491497.
P. Horster and M. Michels and H. Petersen. “Authenticated encryption schemes with low communication costs”, Electronic Letters 30 (15), pp. 12121213, 1994.
M. S. Hwang and J. Y. Hsiao and Y.P. Chu. “Improvement of authenticated encryption schemes with message linkages for message flows”, IEICE Trans. Inf. & Syst., vol. E89D, no.4, pp. 15751577, 2006.
K. Neyberg and R. Ruppel. “Message recovery for signature schemes based on the discrete logarithm problem”, Advances in CryptologyErocryt’94, LNCS 950, Springer, Berlin, 1994, pp.175190.
M. Rasslan. “Cryptanalysis of HwangLoHsiaoChu Authenticated Encryption Schemes”, IEICE Trans. Inf. & Syst., vol. E93D, no.5, pp. 13011302, 2010.
Z. Shao. “Improvement of digital signature with message recovery using selfcertified public keys and its variants”, Applied Mathematics and Computation 159, pp. 391399, 2004.
C.s. Tsai and S.C. Lin and M.S. Hwang. “Cryptanalysis of an authenticated encryption scheme using selfcertified public keys”, Applied Mathematics and Computation 166, pp. 118122, 2005.
Y.M. Tseng and J.K. Jan and H.Y. Chien. “Digital signature with message recovery using selfcertified public keys and its variant.” Applied Mathematics and Computation 136, pp. 203214, 2003.
Q. Xie and Y. Xiu. “Cryptanalysis of Tseng et al.’s authenticated encryption schemes”, Applied Mathematics and Computation 158, pp. 15, 2004.
Zh. Zhang and F. Feng, F. “Cryptanalysis of some signature schemes with message recovery”, Applied Mathematics and Computation 170, pp.103114, 2005.
Refbacks
 There are currently no refbacks.
