On the security of a convertible authenticated encryption

被引:9
|
作者
Zhang, JH [1 ]
Wang, YM
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
[2] Xidian Univ, State Key Lab, ISN, Xian 710071, Shaanxi, Peoples R China
关键词
security analysis; improved authenticated encryption scheme; secure proof;
D O I
10.1016/j.amc.2004.11.010
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we give security analysis to the convertible authenticated encryption scheme of Hung-Yu Chien [H.-Y. Chien, Convertible authenticated encryption scheme without using conventional one-way function, Informatica 14 (4) (2003) 1-9, Institute of Mathematics and Inforamtica, ISSN 0868-4952], and show that H.Y. Chien scheme have forgeability and repudiation; at the same time, we give the corresponding attack. Finally, we propose an improved publicly verifiable authenticated encryption schemes based on the Hung-Yu Chien Scheme. As for efficiency, the computation cost and communication overhead of our improved schemes are as small as the original schemes and in comparison with the original scheme, our improved scheme is more secure. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1063 / 1069
页数:7
相关论文
共 50 条
  • [21] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    [J]. INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [22] Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version
    Chang, Ting-Yi
    Yang, Chou-Chen
    Hwang, Min-Shiang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 151 - 162
  • [23] A sec-email protocol based on the convertible authenticated encryption scheme
    Cui J.
    Liu Q.
    Zhang Z.-T.
    Li Z.-X.
    Yang Y.-X.
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (04): : 598 - 602+622
  • [24] Security Analysis of a Convertible Multiauthenticated Encryption Scheme
    Zhang Jian Hong
    Liu Xue
    Liu ChengLian
    [J]. MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
  • [25] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [26] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
  • [27] On the security of generalization of threshold signature and authenticated encryption
    Tseng, Yuh-Min
    Jan, Jinn-Ke
    Chien, Hung-Yu
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2606 - 2609
  • [28] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [29] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [30] Authenticated encryption and steganography in unconditional security setting
    Matsumoto, T
    Shikata, J
    [J]. 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6