Improved convertible authenticated encryption scheme with provable security

被引:6
|
作者
Lin, Han-Yu [1 ]
Hsu, Chien-Lung [1 ,2 ]
Huang, Shih-Kun [3 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] NTUST, Taiwan Informat Secur Ctr, Taipei 106, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
Cryptography; Convertible; Authenticated encryption; EIGamal system; Provable security; Random oracle model; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.ipl.2011.03.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated recipient to reveal an ordinary signature for dealing with a later dispute over repudiation. Based on the EIGamal cryptosystem, in 2009, Lee et al. proposed a CAE scheme with only heuristic security analyses. In this paper, we will demonstrate that their scheme is vulnerable to the chosen-plaintext attack and then further propose an improved variant. Additionally, in the random oracle model, we prove that the improved scheme achieves confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA). (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:661 / 666
页数:6
相关论文
共 50 条
  • [21] Extended abstract: Provable-security analysis of authenticated encryption in kerberos
    Boldyreva, Alexandra
    Kumar, Virendra
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 92 - +
  • [22] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [23] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [24] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [25] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [26] A sec-email protocol based on the convertible authenticated encryption scheme
    Cui, Jun
    Liu, Qi
    Zhang, Zhen-Tao
    Li, Zhong-Xian
    Yang, Yi-Xian
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (04): : 598 - 602
  • [27] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
  • [28] Improved Encryption Padding for ECC System with Provable Security
    Yang Yatao
    Zhang Fengjuan
    Li Zichen
    Zhang Yaze
    [J]. LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 231 - 239
  • [29] Provably convertible multi-authenticated encryption scheme for generalized group communications
    Lu, Chung-Fu
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. INFORMATION SCIENCES, 2012, 199 : 154 - 166
  • [30] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74