Abstract
Recently, Zhang et al. proposed two encryption schemes using an elliptic curve combined public key. We show, via the trick of using a linear equation system, that both proposals are vulnerable to key recovery attack, and thus in the present form must be considered as insecure. We simulate our trick on a common personal laptop and always get the results at a sub-second level.
| Original language | English |
|---|---|
| Pages (from-to) | 1111-1113 |
| Number of pages | 3 |
| Journal | Applied Mathematics Letters |
| Volume | 25 |
| Issue number | 8 |
| DOIs | |
| State | Published - Aug 2012 |
Keywords
- Combined public key
- Key privacy
- Public key encryption