Improvement on a threshold authenticated encryption scheme

被引:3
|
作者
Tan Z. [1 ,2 ]
机构
[1] School of Information Technology, Jiangxi University of Finance and Economics, Nanchang City 330013, Jiangxi Province
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province
关键词
Authenticated encryption scheme; Elliptic curve cryptosystem; Signature; Threshold cryptography;
D O I
10.4304/jsw.5.7.697-704
中图分类号
学科分类号
摘要
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encryption-then-signature schemes, threshold authenticated encryption schemes can meet more security requirements, including robustness, confidentiality, unforgeability, integrity, authenticity and non-repudiation. Based on Tseng and Jan's authenticated encryption scheme and elliptic curve cryptosystem, Chung et al. [2] recently proposed an efficient (t, n) threshold authenticated encryption scheme which can reduce the load of the signers by applying a division-of-labor signature technique. However, the paper demonstrates that there exists a design defect, the threshold authentication signature scheme cannot resist against insider attack and the scheme is not robust. Then, an improved authenticated encryption scheme based on elliptic curve cryptosystem is proposed. The novel authenticated encryption scheme removes the above-mentioned weaknesses. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:697 / 704
页数:7
相关论文
共 50 条
  • [1] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [2] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [3] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    [J]. Journal of Harbin Institute of Technology(New series), 2007, (01) : 26 - 28
  • [4] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [5] The security of the improvement on the generalization of threshold signature and authenticated encryption
    Lee, NY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) : 2364 - 2367
  • [6] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [7] A division-of-labor based threshold authenticated encryption scheme
    Tan Z.-W.
    Fan Y.-F.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1183 - 1194
  • [8] Improvement of authenticated encryption scheme with (t, n) shared verification
    Lu, JZ
    Chen, HY
    [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 445 - 448
  • [9] A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
    Chen, Zhen
    Zhang, Wenfang
    Wang, Xiaomin
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 10 - 13
  • [10] A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
    Chen, Zhen
    Zhang, Wenfang
    Wang, Xiaomin
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 27 - 30