Method of constructing elliptic curve authenticated encryption scheme

被引:4
|
作者
Zhao, ZM
Liu, FY
机构
[1] Hohai Univ, Comp & Informat Engn Coll, Changzhou 213002, Peoples R China
[2] Nanjing Univ Sch & Technol, Dept Comp Sci, Nanjing 210094, Peoples R China
关键词
digital signature; elliptic curve cryptosystem; signature scheme with message recovery; authenticated encryption scheme;
D O I
10.1016/j.amc.2004.08.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [1] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [2] Practical authenticated encryption scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 461 - 469
  • [3] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [4] Elliptic curve based authenticated encryption scheme and its application for electronic payment system
    Kumar, Rajeev
    Pal, S. K.
    Yadav, Arvind
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2018, 9 (01) : 90 - 101
  • [5] Authenticated public-key encryption based on elliptic curve
    Han, YL
    Yang, XY
    Hu, YP
    ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 424 - 431
  • [6] Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem
    Tahat, Nedal
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2016, 54 (03) : 229 - 235
  • [7] Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem
    Hsu, CL
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 882 - 890
  • [8] Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
    Hwang, SJ
    Liao, HC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 717 - 721
  • [9] A provably secure elliptic curve scheme with fast encryption
    Galindo, D
    Martín, S
    Takagi, T
    Villar, JL
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 245 - 259
  • [10] An Integrated Image Encryption Scheme Based on Elliptic Curve
    Khalid, Ijaz
    Shah, Tariq
    Eldin, Sayed M.
    Shah, Dawood
    Asif, Muhammad
    Saddique, Imran
    IEEE ACCESS, 2023, 11 : 5483 - 5501