摘要
Recently, Zhang et al. proposed two encryption schemes using an elliptic curve combined public key. We show, via the trick of using a linear equation system, that both proposals are vulnerable to key recovery attack, and thus in the present form must be considered as insecure. We simulate our trick on a common personal laptop and always get the results at a sub-second level.
| 源语言 | 英语 |
|---|---|
| 页(从-至) | 1111-1113 |
| 页数 | 3 |
| 期刊 | Applied Mathematics Letters |
| 卷 | 25 |
| 期 | 8 |
| DOI | |
| 出版状态 | 已出版 - 8月 2012 |
指纹
探究 'Pitfalls in identity based encryption using an elliptic curve combined public key' 的科研主题。它们共同构成独一无二的指纹。引用此
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver