| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 9506477 | Applied Mathematics and Computation | 2005 | 5 Pages |
Abstract
In Hsu-Wu's authenticated encryption scheme with threshold shared verification, there is a strong assumption that all verifiers in the verifier group honestly execute the decryption process to recovery the message m. However, in practical application, it is hard to trust that all the members in the verifier group are honest. Two possible attacks are proposed. One is an intercepts attack and one is counterfeit commit value attack.
Keywords
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Shin-Jia Hwang, Hao-Chih Liao,
