Method of constructing elliptic curve authenticated encryption scheme

被引:4
|
作者
Zhao, ZM
Liu, FY
机构
[1] Hohai Univ, Comp & Informat Engn Coll, Changzhou 213002, Peoples R China
[2] Nanjing Univ Sch & Technol, Dept Comp Sci, Nanjing 210094, Peoples R China
关键词
digital signature; elliptic curve cryptosystem; signature scheme with message recovery; authenticated encryption scheme;
D O I
10.1016/j.amc.2004.08.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [21] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Farash, Mohammad Sabzinejad
    Naqvi, Husnain
    Sher, Muhammad
    ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 113 - 139
  • [22] An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
    Oladipupo, Esau Taiwo
    Abikoye, Oluwakemi Christiana
    Imoize, Agbotiname Lucky
    Awotunde, Joseph Bamidele
    Chang, Ting-Yi
    Lee, Cheng-Chi
    Do, Dinh-Thuan
    IEEE ACCESS, 2023, 11 : 1306 - 1323
  • [23] An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System
    Toughi, Shahryar
    Fathi, Mohammad H.
    Sekhavat, Yoones A.
    SIGNAL PROCESSING, 2017, 141 : 217 - 227
  • [24] A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 106 - 112
  • [25] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [26] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [27] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [28] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704
  • [29] An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
    Luo, Yuling
    Ouyang, Xue
    Liu, Junxiu
    Cao, Lvchen
    IEEE ACCESS, 2019, 7 : 38507 - 38522
  • [30] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Benssalah, Mustapha
    Rhaskali, Yesser
    Drouiche, Karim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 2081 - 2107