| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 9506597 | Applied Mathematics and Computation | 2005 | 5 Pages |
Abstract
Recently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys. In their scheme, only the specified receiver can verify and recover the message. In this article, we will demonstrate their scheme cannot withstand the known plaintext-ciphertext attack. The intruder has ability to expose every message sent between the signer and the specified receiver.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang,
