Improved convertible authenticated encryption scheme with provable security

被引:6
|
作者
Lin, Han-Yu [1 ]
Hsu, Chien-Lung [1 ,2 ]
Huang, Shih-Kun [3 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
[2] NTUST, Taiwan Informat Secur Ctr, Taipei 106, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
Cryptography; Convertible; Authenticated encryption; EIGamal system; Provable security; Random oracle model; LIMITED VERIFIER SIGNATURE;
D O I
10.1016/j.ipl.2011.03.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated recipient to reveal an ordinary signature for dealing with a later dispute over repudiation. Based on the EIGamal cryptosystem, in 2009, Lee et al. proposed a CAE scheme with only heuristic security analyses. In this paper, we will demonstrate that their scheme is vulnerable to the chosen-plaintext attack and then further propose an improved variant. Additionally, in the random oracle model, we prove that the improved scheme achieves confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA). (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:661 / 666
页数:6
相关论文
共 50 条
  • [31] Convertible authenticated encryption scheme without using conventional one-way function
    Chien, HY
    [J]. INFORMATICA, 2003, 14 (04) : 445 - 454
  • [32] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [34] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [35] Selectively convertible authenticated encryption in the random oracle model
    Chien, Hung-Yu
    [J]. COMPUTER JOURNAL, 2008, 51 (04): : 419 - 434
  • [36] Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
    Xie, Qi
    Wang, Guilin
    Xia, Fubiao
    Chen, Deren
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1038 - 1051
  • [37] A new online auction with convertible authenticated encryption and authentication
    Luo, Guo-Lun
    Chang, Henry Ker-Chang
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 288 - +
  • [38] A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    Li, Chun-Ta
    [J]. PARALLEL PROCESSING LETTERS, 2016, 26 (04)
  • [39] ZLR: a fast online authenticated encryption scheme achieving full security
    Choi, Wonseok
    Hwang, Seongha
    Lee, Byeonghak
    Lee, Jooyoung
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (10) : 3261 - 3316
  • [40] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37