Article ID Journal Published Year Pages File Type
9506597 Applied Mathematics and Computation 2005 5 Pages PDF
Abstract
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys. In their scheme, only the specified receiver can verify and recover the message. In this article, we will demonstrate their scheme cannot withstand the known plaintext-ciphertext attack. The intruder has ability to expose every message sent between the signer and the specified receiver.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, , ,