Abstract
Recently, Tzeng and Hwang proposed an authenticated encryption scheme based on elliptic curve discrete logarithm problem. In such a scheme, the signer can sign a message for a designated verifier and only the designated verifier can retrieve and verify the message from the generated signature. This paper, however, will demonstrate an attack on the Tzeng-Hwang scheme that an adversary intercepting any signature transmitted between the signer and the designated verifier can recover the corresponding signed message, provided that one verified message is released. Finally, we improve the Tzeng-Hwang scheme to counter the proposed attack and achieve the security requirements of an authenticated encryption scheme.
Original language | English |
---|---|
Pages (from-to) | 882-890 |
Number of pages | 9 |
Journal | Applied Mathematics and Computation |
Volume | 167 |
Issue number | 2 |
DOIs | |
State | Published - 15 08 2005 |
Externally published | Yes |
Keywords
- Authenticated encryption scheme
- Cryptanalysis
- Elliptic curve
- Message recovery