Article ID Journal Published Year Pages File Type
9506477 Applied Mathematics and Computation 2005 5 Pages PDF
Abstract
In Hsu-Wu's authenticated encryption scheme with threshold shared verification, there is a strong assumption that all verifiers in the verifier group honestly execute the decryption process to recovery the message m. However, in practical application, it is hard to trust that all the members in the verifier group are honest. Two possible attacks are proposed. One is an intercepts attack and one is counterfeit commit value attack.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,