Method of constructing elliptic curve authenticated encryption scheme

被引:4
|
作者
Zhao, ZM
Liu, FY
机构
[1] Hohai Univ, Comp & Informat Engn Coll, Changzhou 213002, Peoples R China
[2] Nanjing Univ Sch & Technol, Dept Comp Sci, Nanjing 210094, Peoples R China
关键词
digital signature; elliptic curve cryptosystem; signature scheme with message recovery; authenticated encryption scheme;
D O I
10.1016/j.amc.2004.08.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [41] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Abd El-Latif, Ahmed A.
    Li, Li
    Niu, Xiamu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1559 - 1584
  • [42] An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption Scheme
    Buettner, Carsten
    Huss, Sorin A.
    INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 139 - 159
  • [43] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [44] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [45] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [46] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [47] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [48] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [49] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [50] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25