Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
نویسندگان
چکیده
منابع مشابه
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users are not properly predetermined in Yang et al.’s GGOC, an unauthorized decryption set of users can recover the encrypted message without difficulty. This study also presents an improved protocol to resist such an attack.
متن کاملSimple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem
In the generalized group-oriented cryptosystem, the sender can send a conditional message to a group of users such that only the specified sets of users in this group can cooperate to decrypt this message. In this paper, we will use an ElGamal cryptosystem and an elliptic curve ElGamal cryptosystem to achieve the purposes of generalization and group-orientation, respectively. Both of our scheme...
متن کاملAn Computation-Efficient Generalized Group-Oriented Cryptosystem
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the message. Recently, Li et al. pointed out unauthorized sets in the receiving group can recover the encrypted messages in Yang et al.’s GOC; and they further repaired this security flaw. However, the improved GOC contains...
متن کاملThe ElGamal cryptosystem over circulant matrices
In this paper we study extensively the discrete logarithm problem in the group of non-singular circulant matrices. The emphasis of this study was to find the exact parameters for the group of circulant matrices for a secure implementation. We tabulate these parameters. We also compare the discrete logarithm problem in the group of circulant matrices with the discrete logarithm problem in finite...
متن کاملEffective software-oriented cryptosystem in complex PC security software
To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, wich maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2007
ISSN: 0868-4952,1822-8844
DOI: 10.15388/informatica.2007.163