Method of constructing elliptic curve authenticated encryption scheme

被引:4
|
作者
Zhao, ZM
Liu, FY
机构
[1] Hohai Univ, Comp & Informat Engn Coll, Changzhou 213002, Peoples R China
[2] Nanjing Univ Sch & Technol, Dept Comp Sci, Nanjing 210094, Peoples R China
关键词
digital signature; elliptic curve cryptosystem; signature scheme with message recovery; authenticated encryption scheme;
D O I
10.1016/j.amc.2004.08.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [31] An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography
    Mustapha Benssalah
    Yesser Rhaskali
    Karim Drouiche
    Multimedia Tools and Applications, 2021, 80 : 2081 - 2107
  • [32] An Efficient Method for text Encryption using Elliptic Curve Cryptography
    Das, Prasenjit
    Giri, Chandan
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 96 - 101
  • [33] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [34] Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security
    Selvi, S.
    Gobi, M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 71 - 78
  • [35] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Ahmed A. Abd El-Latif
    Li Li
    Xiamu Niu
    Multimedia Tools and Applications, 2014, 70 : 1559 - 1584
  • [36] Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme
    Gayoso Martinez, V.
    Hernandez Encinas, L.
    Queiruga Dios, A.
    CRYPTOLOGIA, 2015, 39 (03) : 244 - 269
  • [37] Pairing Based Elliptic Curve Encryption Scheme with Hybrid Problems in Smart House
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    PROCEEDINGS OF THE 2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND INFORMATION PROCESSING (ICICIP), 2013, : 64 - 68
  • [38] An Efficient Audio Encryption Scheme Based on Elliptic Curve over Finite Fields
    Rehman, Hafeez Ur
    Hazzazi, Mohammad Mazyad
    Shah, Tariq
    Bassfar, Zaid
    Shah, Dawood
    MATHEMATICS, 2023, 11 (18)
  • [39] Color image encryption based on chaotic systems and elliptic curve ElGamal scheme
    Wu, Jiahui
    Liao, Xiaofeng
    Yang, Bo
    SIGNAL PROCESSING, 2017, 141 : 109 - 124
  • [40] A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography
    Liang, Haotian
    Zhang, Guidong
    Hou, Wenjin
    Huang, Pinyi
    Liu, Bo
    Li, Shouliang
    APPLIED SCIENCES-BASEL, 2021, 11 (12):