Artemia: A Family of Provably Secure Authenticated Encryption Schemes

被引:0
|
作者
Alizadeh, Javad [1 ,2 ]
Aref, Mohammad Reza [1 ]
Bagheri, Nasour [3 ]
机构
[1] Sharif Univ Technol, Elect Engn Dept, ISSL, Tehran, Iran
[2] Imam Hossein Univ, Fac & Res Ctr Commun & Informat Technol, Tehran, Iran
[3] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran, Iran
关键词
Privacy; Authentication; Provable Security; Authenticated Encryption; Artemia;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the inverse of the permutation in the decryption function, which causes the resource efficiency. Artemia permutations have an efficient and a simple structure and are provably secure against the differential and linear cryptanalysis. In the permutations, MDS recursive layers are used that can be easily implemented in both software and hardware. (C) 2014 ISC. All rights reserved.
引用
收藏
页码:125 / 139
页数:15
相关论文
共 50 条
  • [1] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [2] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    [J]. IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70
  • [3] Towards provably secure asymmetric image encryption schemes
    Azam, Naveed Ahmed
    Zhu, Jianshen
    Hayat, Umar
    Shurbevski, Aleksandar
    [J]. INFORMATION SCIENCES, 2023, 631 : 164 - 184
  • [4] Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING
    Boorghany, A.
    Bayat-Sarmadi, S.
    Jalili, R.
    [J]. SCIENTIA IRANICA, 2018, 25 (06) : 3442 - 3460
  • [5] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [6] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [7] Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX
    Liu, Yongzhi
    Qin, Guiyun
    Liu, Pengtao
    Hu, Chengyu
    Guo, Shanqing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (12): : 2709 - 2724
  • [8] TriviA and uTriviA: two fast and secure authenticated encryption schemes
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 29 - 48
  • [9] Secure channels based on authenticated encryption schemes: A simple characterization
    Namprempre, C
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 515 - 532
  • [10] Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
    Tseng, Yi-Fan
    Fan, Chun-I
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (06) : 1517 - 1541