A Cryptanalysis on a Generalized Threshold Cryptosystem

نویسندگان

  • Chin-Chen Chang
  • Wen-Bin Wu
  • Jieh-Shan Yeh
چکیده

In 1987, Desmedt first proposed a group oriented cryptosystem. During the past decade, group oriented cryptosystem has become one of the important cryptographical primitives. Laih and Harn proposed a generalized threshold cryptosystem with two models in 1991. In their system, each group is only assigned public key. A ciphertext can be decoded by utilizing all the secret keys owned by the users of any access instance. In this paper we will show that Laih-Harn’s generalized threshold cryptosystem can not withstand a cooperative attack. Their cryptosystem is insecure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of a Threshold Proxy Signature Scheme∗

A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group of n proxy signers to sign messages on behalf of an original signer. Recently, Hwang et al. proposed a new (t, n) threshold proxy signature scheme based on the RSA cryptosystem. In this paper, we show that their scheme is insecure against the original signer’s forgery and the general forgery.

متن کامل

Attacks on a threshold proxy signature scheme based on the RSA cryptosystem

Recently, Hwang et al. propose an efficient (t, n) threshold proxy signature scheme in which the original signer can authorize n proxy signers such that only the cooperation of t or more of them is able to generate a proxy signature on behalf of the original signer. Their scheme is based on the RSA cryptosystem. They claim that any t out of n proxy signers cannot derive the original signer’s pr...

متن کامل

Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes

In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidreau is described. It allows the reconstruction of the private key for almost all practical parameter choices in polynomial time with high probability.

متن کامل

CAES Cryptosystem: Advanced Security Tests and Results

A robust and secure cryptosystem is an encrypting system that resists against all practical cryptanalysis methods such as statistical attacks, differential cryptanalysis and linear cryptanalysis. To prove the resistance against these attacks, the cryptosystem designer must carry out a list of robustness tests. Considering these constraints, we present in the current paper results of robustness ...

متن کامل

Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006