Convertible multi-authenticated encryption scheme

被引:21
|
作者
Wu, Tzong-Sun
Hsu, Chien-Lung [1 ]
Tsai, Kuo-Yu
Lin, Han-Yu
Wu, Tzong-Chen
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
[3] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[4] Huafan Univ, Dept Informat Management, Taipei 223, Taiwan
[5] Acad Sinica, Inst Informat Sci, Taiwan Informat Secur Ctr TWISC, Taipei 115, Taiwan
关键词
authenticated encryption; multi-party applications; digital signature; public key infrastructure;
D O I
10.1016/j.ins.2007.06.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A convertible authenticated encryption (CAE) scheme allows the signer to generate a valid authenticated ciphertext on his chosen message such that only the designated recipient can retrieve the message. Further, the recipient has the ability to convert the authenticated ciphertext into ordinary signature in case of a dispute or repudiation. The previous proposed CAE schemes can only allow one signer to produce the authenticated ciphertext. It might be inadequate for multiparty environments. In this paper, we elaborate on the merits of CAE and multi-signature schemes to propose a convertible multi-authenticated encryption scheme which has the following advantages: (i) The size of the generated authenticated ciphertext is independent of the number of total participating signers. (ii) Except for the designated recipient, no one can obtain the signed message and verify its corresponding signature. (iii) The signature is cooperatively produced by a group of signers instead of a single signer. (iv) In case of a later dispute on repudiation, the recipient has the ability to convert the authenticated ciphertext into an ordinary one for convincing anyone of the signers' dishonesty. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:256 / 263
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [22] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [23] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [24] A sec-email protocol based on the convertible authenticated encryption scheme
    Cui J.
    Liu Q.
    Zhang Z.-T.
    Li Z.-X.
    Yang Y.-X.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (04): : 598 - 602+622
  • [25] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [26] Convertible authenticated encryption scheme without using conventional one-way function
    Chien, HY
    INFORMATICA, 2003, 14 (04) : 445 - 454
  • [27] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [28] Selectively convertible authenticated encryption in the random oracle model
    Chien, Hung-Yu
    COMPUTER JOURNAL, 2008, 51 (04): : 419 - 434
  • [29] Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
    Xie, Qi
    Wang, Guilin
    Xia, Fubiao
    Chen, Deren
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1038 - 1051
  • [30] A new online auction with convertible authenticated encryption and authentication
    Luo, Guo-Lun
    Chang, Henry Ker-Chang
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 288 - +