On the security of a convertible authenticated encryption

被引:9
|
作者
Zhang, JH [1 ]
Wang, YM
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
[2] Xidian Univ, State Key Lab, ISN, Xian 710071, Shaanxi, Peoples R China
关键词
security analysis; improved authenticated encryption scheme; secure proof;
D O I
10.1016/j.amc.2004.11.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we give security analysis to the convertible authenticated encryption scheme of Hung-Yu Chien [H.-Y. Chien, Convertible authenticated encryption scheme without using conventional one-way function, Informatica 14 (4) (2003) 1-9, Institute of Mathematics and Inforamtica, ISSN 0868-4952], and show that H.Y. Chien scheme have forgeability and repudiation; at the same time, we give the corresponding attack. Finally, we propose an improved publicly verifiable authenticated encryption schemes based on the Hung-Yu Chien Scheme. As for efficiency, the computation cost and communication overhead of our improved schemes are as small as the original schemes and in comparison with the original scheme, our improved scheme is more secure. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1063 / 1069
页数:7
相关论文
共 50 条
  • [1] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [2] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [3] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    [J]. INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263
  • [4] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    [J]. Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [5] Selectively convertible authenticated encryption in the random oracle model
    Chien, Hung-Yu
    [J]. COMPUTER JOURNAL, 2008, 51 (04): : 419 - 434
  • [6] A new online auction with convertible authenticated encryption and authentication
    Luo, Guo-Lun
    Chang, Henry Ker-Chang
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 288 - +
  • [7] A new convertible authenticated encryption scheme with message linkages
    Tzeng, Shiang-Feng
    Tang, Yuan-Liang
    Hwang, Min-Shiang
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 133 - 138
  • [8] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    [J]. COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [9] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [10] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    [J]. INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434