Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations

被引:0
|
作者
Hsu, Chien-Lung [2 ,4 ]
Lin, Yu-Li [1 ]
Wu, Tzong-Chen [3 ,4 ]
Su, Chain-Hui [2 ,4 ]
机构
[1] Minist Justice Invest Bur, Taipei 231, Taiwan
[2] Chang Gung Univ, Dept Informat Mgmt, Taoyuan, Taiwan
[3] Natl Taiwan Univ Sci Technol, Dept Informat Mgmt, Taipei, Taiwan
[4] Taiwan Informat Security Ctr, Taipei, Taiwan
来源
关键词
authenticated encryption scheme; group-oriented; hierarchical; message recovery;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature that can be verified by anyone. In this paper, we elaborate on the merits of CAE and secret sharing schemes to propose two new (t, n) threshold authenticated encryption schemes for hierarchical structures. Our proposed schemes not only allow i-th level participants to support the (i+1)-th level participants to generate the authenticated encryption messages, but also allow the participants of i-th or higher levels to cooperatively generate the valid ones. Any authenticated ciphertext for a message is addressed to a specified group of signers in such a way that the ability to generate the ciphertext is regulated by the adopted (t, n) threshold schemes. Furthermore, the proposed schemes achieve the security requirements of an authenticated encryption scheme.
引用
收藏
页码:23 / +
页数:2
相关论文
共 50 条
  • [1] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [2] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [3] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [4] A new convertible authenticated encryption scheme with message linkages
    Tzeng, Shiang-Feng
    Tang, Yuan-Liang
    Hwang, Min-Shiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 133 - 138
  • [5] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [6] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434
  • [7] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [8] Improvement on a threshold authenticated encryption scheme
    Tan, Zuowen
    [J]. Journal of Software, 2010, 5 (07) : 697 - 704
  • [9] A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (02) : 351 - 359
  • [10] Convertible multi-authenticated encryption scheme for data communication
    Huang, Hui-Feng
    Lin, Pin-Han
    Tsai, Min-Hsuan
    [J]. International Journal of Network Security, 2015, 17 (01) : 40 - 48