Convertible multi-authenticated encryption scheme

被引:21
|
作者
Wu, Tzong-Sun
Hsu, Chien-Lung [1 ]
Tsai, Kuo-Yu
Lin, Han-Yu
Wu, Tzong-Chen
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Chilung 202, Taiwan
[3] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[4] Huafan Univ, Dept Informat Management, Taipei 223, Taiwan
[5] Acad Sinica, Inst Informat Sci, Taiwan Informat Secur Ctr TWISC, Taipei 115, Taiwan
关键词
authenticated encryption; multi-party applications; digital signature; public key infrastructure;
D O I
10.1016/j.ins.2007.06.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A convertible authenticated encryption (CAE) scheme allows the signer to generate a valid authenticated ciphertext on his chosen message such that only the designated recipient can retrieve the message. Further, the recipient has the ability to convert the authenticated ciphertext into ordinary signature in case of a dispute or repudiation. The previous proposed CAE schemes can only allow one signer to produce the authenticated ciphertext. It might be inadequate for multiparty environments. In this paper, we elaborate on the merits of CAE and multi-signature schemes to propose a convertible multi-authenticated encryption scheme which has the following advantages: (i) The size of the generated authenticated ciphertext is independent of the number of total participating signers. (ii) Except for the designated recipient, no one can obtain the signed message and verify its corresponding signature. (iii) The signature is cooperatively produced by a group of signers instead of a single signer. (iv) In case of a later dispute on repudiation, the recipient has the ability to convert the authenticated ciphertext into an ordinary one for convincing anyone of the signers' dishonesty. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:256 / 263
页数:8
相关论文
共 50 条
  • [41] Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version
    Chang, Ting-Yi
    Yang, Chou-Chen
    Hwang, Min-Shiang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 151 - 162
  • [42] Security Analysis of a Convertible Multiauthenticated Encryption Scheme
    Zhang Jian Hong
    Liu Xue
    Liu ChengLian
    MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
  • [43] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [44] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [45] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [46] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [47] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [48] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [49] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [50] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095