2004
DOI: 10.1007/978-3-540-30144-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Two Signcryption Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…Huang and Chang (2003), point out that Wu and Hsu (2003), scheme is not safe, since the adversary is capable of signature conversion, if he has the knowledge of the actual message and project an improvised scheme. Unfortunately, Wang et al (2004), scheme given by Huang and Chang (2003), is also insecure against known plain text attack. They analyzes that a new ciphertext can be decrypted by an adversary, if he has an idea of some of the of previous valid ciphertext.…”
Section: Introductionmentioning
confidence: 99%
“…Huang and Chang (2003), point out that Wu and Hsu (2003), scheme is not safe, since the adversary is capable of signature conversion, if he has the knowledge of the actual message and project an improvised scheme. Unfortunately, Wang et al (2004), scheme given by Huang and Chang (2003), is also insecure against known plain text attack. They analyzes that a new ciphertext can be decrypted by an adversary, if he has an idea of some of the of previous valid ciphertext.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore the Huang-Chang scheme which is the combination of the ElGamal encryption scheme and the Schnorr signature scheme at the same time is widely believed that the ElGamal cryptosystem is very secure, and the security of the Schnorr signature scheme is proved to be equivalent to the discrete log problem [9]. We note that the Huang-Chang scheme is indeed satisfying the unforgeability and non-repudiation requirements of any cryptographic algorithm [12].…”
Section: Schnorr Signcryption Schemementioning
confidence: 99%
“…The Schnorr Signcryption scheme is based on The Huang-Chang Scheme, which is a combination of ElGamal encryption scheme and the Schnorr digital signature scheme [9]. There are four phases in this scheme: setup, Signcryption, Unsigncryption and conversion.…”
Section: Schnorr Signcryption Schemementioning
confidence: 99%
See 2 more Smart Citations