Convertible multi-authenticated encryption scheme

被引:21
|
作者
Wu, Tzong-Sun
Hsu, Chien-Lung [1 ]
Tsai, Kuo-Yu
Lin, Han-Yu
Wu, Tzong-Chen
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
[3] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[4] Huafan Univ, Dept Informat Management, Taipei 223, Taiwan
[5] Acad Sinica, Inst Informat Sci, Taiwan Informat Secur Ctr TWISC, Taipei 115, Taiwan
关键词
authenticated encryption; multi-party applications; digital signature; public key infrastructure;
D O I
10.1016/j.ins.2007.06.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A convertible authenticated encryption (CAE) scheme allows the signer to generate a valid authenticated ciphertext on his chosen message such that only the designated recipient can retrieve the message. Further, the recipient has the ability to convert the authenticated ciphertext into ordinary signature in case of a dispute or repudiation. The previous proposed CAE schemes can only allow one signer to produce the authenticated ciphertext. It might be inadequate for multiparty environments. In this paper, we elaborate on the merits of CAE and multi-signature schemes to propose a convertible multi-authenticated encryption scheme which has the following advantages: (i) The size of the generated authenticated ciphertext is independent of the number of total participating signers. (ii) Except for the designated recipient, no one can obtain the signed message and verify its corresponding signature. (iii) The signature is cooperatively produced by a group of signers instead of a single signer. (iv) In case of a later dispute on repudiation, the recipient has the ability to convert the authenticated ciphertext into an ordinary one for convincing anyone of the signers' dishonesty. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:256 / 263
页数:8
相关论文
共 50 条
  • [31] A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    Li, Chun-Ta
    PARALLEL PROCESSING LETTERS, 2016, 26 (04)
  • [32] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [33] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [34] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [35] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [36] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [37] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [38] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [39] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [40] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704