Improved convertible authenticated encryption scheme with provable security

被引:6
|
作者
Lin, Han-Yu [1 ]
Hsu, Chien-Lung [1 ,2 ]
Huang, Shih-Kun [3 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] NTUST, Taiwan Informat Secur Ctr, Taipei 106, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
Cryptography; Convertible; Authenticated encryption; EIGamal system; Provable security; Random oracle model; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.ipl.2011.03.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated recipient to reveal an ordinary signature for dealing with a later dispute over repudiation. Based on the EIGamal cryptosystem, in 2009, Lee et al. proposed a CAE scheme with only heuristic security analyses. In this paper, we will demonstrate that their scheme is vulnerable to the chosen-plaintext attack and then further propose an improved variant. Additionally, in the random oracle model, we prove that the improved scheme achieves confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA). (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:661 / 666
页数:6
相关论文
共 50 条
  • [1] On the security of a convertible authenticated encryption
    Zhang, JH
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1063 - 1069
  • [2] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [3] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [4] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [5] Provable-security analysis of authenticated encryption in Kerberos
    Boldyreva, A.
    Kumar, V.
    [J]. IET INFORMATION SECURITY, 2011, 5 (04) : 207 - 219
  • [6] A new convertible authenticated encryption scheme with message linkages
    Tzeng, Shiang-Feng
    Tang, Yuan-Liang
    Hwang, Min-Shiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 133 - 138
  • [7] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434
  • [8] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [9] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [10] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +