EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTION

被引:0
|
作者
Tsai, Jia-Lun [2 ]
Wu, Tzong-Sun [1 ]
Lin, Han-Yu [3 ]
Lee, Jong-Eao [4 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[4] Natl Chiao Tung Univ, Dept Appl Math, Hsinchu 300, Taiwan
关键词
Authenticated encryption; Multisignature; Message recovery; Discrete logarithms; LIMITED VERIFIER SIGNATURE; CRYPTANALYSIS; IMPROVEMENT; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A convertible multi-authenticated encryption (CMAE) scheme providing confidentiality, authenticity and non-repudiation properties allows a designated recipient to recover and verify an authenticated message which is signed by multiple signers. The recipient has the ability to further prove the dishonesty of signers to any third party if they repudiate their signature latter. In 2008, Wu et al. first proposed a CMAE scheme based on. discrete logarithms, but the computational complexity of their scheme is rather high and the message redundancy is required. To improve the performance and remove the message redundancy, Tsai adopted one-way hash functions (such as MD5) to propose a new scheme. In 2005, however, MD5 was cracked by Wang and Yu, which indicates that the schemes using one-way hash functions might turn out to be vulnerable to such an attack. This paper proposes a new efficient CMAE scheme. Neither the one-way hash, function nor the message redundancy is employed in the proposed scheme. The scheme not only preserves the advantages of Wu et al. 's, but also outperforms their scheme. With low computational cost, our proposed scheme can be practically implemented.
引用
收藏
页码:3843 / 3852
页数:10
相关论文
共 37 条
  • [21] A new conic curve digital signature scheme with message recovery and without one-way hash functions
    Tahat, Nedal
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2013, 40 (02): : 148 - 153
  • [22] One-way Hash function construction based on chaotic message expansion
    Guo W.
    Wang X.
    Liu J.
    He D.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2010, 45 (05): : 751 - 757
  • [23] An improved signature scheme without using one-way Hash functions
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 905 - 908
  • [24] Signature scheme based on discrete logarithm without using one-way hash-function
    Yeun, CY
    Mitchell, CJ
    Ng, SL
    ELECTRONICS LETTERS, 1998, 34 (24) : 2329 - 2330
  • [25] On the security of an image encryption scheme based on one-way chaotic function
    Xie, Bangyong
    Wang, Deshi
    Liu, Shihua
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (06): : 52 - 55
  • [26] A new electronic traveler's check scheme based on one-way hash function
    Liaw, Horng-Twu
    Lin, Jiann-Fu
    Wu, Wei-Chen
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2007, 6 (04) : 499 - 508
  • [27] AN optimized LKH scheme based on one-way hash function for secure group communications
    Kang Qiao-Yan
    Meng Xiang-Ru
    Wang Jian-Feng
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1107 - +
  • [28] An efficient batch rekeying scheme based on one-way function tree
    Xu, SZ
    Yang, ZK
    Tan, YM
    Liu, W
    Sesay, S
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 474 - 477
  • [29] An ADS-B Message Authentication Scheme Based on One-way Trapdoor Function
    Lai Xin
    Pan WeiJun
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 87 - 89
  • [30] New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange
    Yoon, EJ
    Yoo, KY
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 147 - 160