University of Wollongong
Browse

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner

Download (162.41 kB)
journal contribution
posted on 2024-11-14, 01:41 authored by Willy SusiloWilly Susilo, Hiroaki Kikuchi
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perform a designated cryptographic operation. This type of cryptographic operation is very important to support an ad-hoc type network, such as the one that is built using Bluetooth or ad-hoc wireless LAN, since the existence of a combiner is not required to decrypt an encrypted message. In the earlier paper, it was shown that a group-oriented encryption scheme, as proposed by Saeednia and Ghodosi, can be subjected to a conspiracy attack in which two participants collude to decrypt an encrypted message. Recently, it was shown that the modified scheme is subjected to a conspiracy attack of at least three group members with probability 0.608. In this paper, we show a stronger result that shows any conspiracy of at least three group members can collude and decrypt an encrypted message.

History

Citation

Susilo, W. & Kikuchi, H. (2007). Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. International Journal of Network Security (IJNS), 4 (3), 288-291.

Journal title

International Journal of Network Security

Volume

4

Issue

3

Pagination

288-291

Language

English

RIS ID

14888

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC