EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTION

被引:0
|
作者
Tsai, Jia-Lun [2 ]
Wu, Tzong-Sun [1 ]
Lin, Han-Yu [3 ]
Lee, Jong-Eao [4 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[4] Natl Chiao Tung Univ, Dept Appl Math, Hsinchu 300, Taiwan
关键词
Authenticated encryption; Multisignature; Message recovery; Discrete logarithms; LIMITED VERIFIER SIGNATURE; CRYPTANALYSIS; IMPROVEMENT; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A convertible multi-authenticated encryption (CMAE) scheme providing confidentiality, authenticity and non-repudiation properties allows a designated recipient to recover and verify an authenticated message which is signed by multiple signers. The recipient has the ability to further prove the dishonesty of signers to any third party if they repudiate their signature latter. In 2008, Wu et al. first proposed a CMAE scheme based on. discrete logarithms, but the computational complexity of their scheme is rather high and the message redundancy is required. To improve the performance and remove the message redundancy, Tsai adopted one-way hash functions (such as MD5) to propose a new scheme. In 2005, however, MD5 was cracked by Wang and Yu, which indicates that the schemes using one-way hash functions might turn out to be vulnerable to such an attack. This paper proposes a new efficient CMAE scheme. Neither the one-way hash, function nor the message redundancy is employed in the proposed scheme. The scheme not only preserves the advantages of Wu et al. 's, but also outperforms their scheme. With low computational cost, our proposed scheme can be practically implemented.
引用
收藏
页码:3843 / 3852
页数:10
相关论文
共 37 条
  • [2] Convertible authenticated encryption scheme without using conventional one-way function
    Chien, HY
    INFORMATICA, 2003, 14 (04) : 445 - 454
  • [3] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [4] A publicly verifiable authenticated encryption scheme without using one-way hash function
    Xie, Shi-Y
    Xu, Bing
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2511 - 2514
  • [5] Convertible multi-authenticated encryption scheme for data communication
    Huang, Hui-Feng
    Lin, Pin-Han
    Tsai, Min-Hsuan
    International Journal of Network Security, 2015, 17 (01) : 40 - 48
  • [6] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70
  • [7] AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION
    LEE, WB
    CHANG, CC
    ELECTRONICS LETTERS, 1995, 31 (19) : 1656 - 1657
  • [8] Study on a signature scheme without using one-way hash functions or message redundancy
    Yu, Baozheng
    Xu, Congwei
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 41 - +
  • [9] Provably convertible multi-authenticated encryption scheme for generalized group communications
    Lu, Chung-Fu
    Hsu, Chien-Lung
    Lin, Han-Yu
    INFORMATION SCIENCES, 2012, 199 : 154 - 166
  • [10] Cryptanalysis and improvement on a digital signature scheme without using one-way hash and message redundancy
    Liu, Jie
    Li, Jianhua
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 266 - 269