Improvement on a threshold authenticated encryption scheme

被引:3
|
作者
Tan Z. [1 ,2 ]
机构
[1] School of Information Technology, Jiangxi University of Finance and Economics, Nanchang City 330013, Jiangxi Province
[2] Key Lab of Network Security and Cryptology, School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007, Fujian Province
关键词
Authenticated encryption scheme; Elliptic curve cryptosystem; Signature; Threshold cryptography;
D O I
10.4304/jsw.5.7.697-704
中图分类号
学科分类号
摘要
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encryption-then-signature schemes, threshold authenticated encryption schemes can meet more security requirements, including robustness, confidentiality, unforgeability, integrity, authenticity and non-repudiation. Based on Tseng and Jan's authenticated encryption scheme and elliptic curve cryptosystem, Chung et al. [2] recently proposed an efficient (t, n) threshold authenticated encryption scheme which can reduce the load of the signers by applying a division-of-labor signature technique. However, the paper demonstrates that there exists a design defect, the threshold authentication signature scheme cannot resist against insider attack and the scheme is not robust. Then, an improved authenticated encryption scheme based on elliptic curve cryptosystem is proposed. The novel authenticated encryption scheme removes the above-mentioned weaknesses. © 2010 ACADEMY PUBLISHER.
引用
下载
收藏
页码:697 / 704
页数:7
相关论文
共 50 条
  • [21] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4
  • [22] A new threshold authenticated encryption scheme using labor-division signature
    Zuowen Tan
    Journal of Systems Science and Complexity, 2010, 23 : 1183 - 1194
  • [23] A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING LABOR-DIVISION SIGNATURE
    Tan, Zuowen
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2010, 23 (06) : 1183 - 1194
  • [24] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [25] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [26] An improved Authenticated (t, n) ECC Threshold Signature Encryption Scheme based on ECC
    Hu, Chao-Ju
    Zhang, Qun-Feng
    Wu, Fen-Lan
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2674 - +
  • [27] On the security of generalization of threshold signature and authenticated encryption
    Tseng, Yuh-Min
    Jan, Jinn-Ke
    Chien, Hung-Yu
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2606 - 2609
  • [28] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [29] Improvement of Tseng et al.'s authenticated encryption scheme with message linkages
    Zhang, Z
    Araki, S
    Xiao, GZ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1475 - 1483
  • [30] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +