透過您的圖書館登入
IP:18.217.208.72
  • 期刊

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without a Combiner

並列摘要


In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perform a designated cryptographic operation. This type of cryptographic operation is very important to support an ad-hoc type network, such as the one that is built using Bluetooth or ad-hoc wireless LAN, since the existence of a combiner is not required to decrypt an encrypted message. In the earlier paper, it was shown that a group-oriented encryption scheme, as proposed by Saeednia and Ghodosi, can be subjected to a conspiracy attack in which two participants collude to decrypt an encrypted message. Recently, it was shown that the modified scheme is subjected to a conspiracy attack of at least three group members with probability 0.608. In this paper, we show a stronger result that shows any conspiracy of at least three group members can collude and decrypt an encrypted message.

被引用紀錄


Tseng, F. K. (2015). 表達式密文搜尋 [doctoral dissertation, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2015.00014
陳奕融(2015)。農地管制之研究-兼論國土規劃與管制〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2015.02518
Lin, H. C. (2008). 具隱私權強化之數位簽章 [doctoral dissertation, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-0207200917355134

延伸閱讀