An efficient convertible authenticated encryption-scheme and its variant

被引:0
|
作者
Huang, HF [1 ]
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The authenticated encryption scheme allows the specified receiver to simultaneously recover and verify a message. Recently, to protect the receiver's benefit of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme in which the receiver can convert the signature into an ordinary one that can be verified by anyone. However, Wu and Hsu's scheme doesn't consider that once the intruder knows the message then the intruder can also easily convert a signature into an ordinary digital signature. In this situation, the intruder may force the signer to be responsible for the terms of agreement of the documents and cause confusion. In this paper, we propose an efficient convertible authenticated encryption scheme which can provide better protection for both the signer and the specified receiver. On the other hand, we also propose an efficient and lower communication convertible authenticated encryption scheme with message linkages. It can be regarded as a variant of the convertible authenticated encryption scheme in that it is designed to link up the message blocks to avoid the message block being reordered, replicated, or partially deleted during the transmission.
引用
收藏
页码:382 / 392
页数:11
相关论文
共 50 条
  • [1] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [2] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [3] A new convertible authenticated encryption scheme with message linkages
    Tzeng, Shiang-Feng
    Tang, Yuan-Liang
    Hwang, Min-Shiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 133 - 138
  • [4] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [5] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434
  • [6] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [7] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [8] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [9] A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (02) : 351 - 359
  • [10] Convertible multi-authenticated encryption scheme for data communication
    Huang, Hui-Feng
    Lin, Pin-Han
    Tsai, Min-Hsuan
    [J]. International Journal of Network Security, 2015, 17 (01) : 40 - 48