Self-Certified Proxy Convertible Authenticated Encryption Scheme

被引:2
|
作者
Lin, Han-Yu [1 ]
Wu, Tzong-Sun [2 ]
Huan, Ting-Yu [1 ]
Yeh, Yi-Shiung [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Hsinchu, Taiwan
关键词
self-certified; proxy signature; convertible; authenticated encryption;
D O I
10.1109/ISDA.2008.139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy convertible authenticated encryption (CAE) scheme allows an original signer to delegate his signing power to a proxy signer such that the proxy signer can generate an authenticated ciphertext on behalf of the original signer The generated authenticated ciphertext can only be decrypted and verified by the specific recipient instead of everyone else for the purpose of confidentiality. Integrating with self-certified public key systems, the proposed scheme can save more communication overheads and computation efforts, since it is not necessary to transmit and verify the public key certificate. That is, authenticating the public key can be combined with subsequent cryptographic operations such as the signature verification. In case of a later repudiation, the specific recipient has the ability to convert the signature into an ordinary one for convincing anyone of the signer dishonesty.
引用
收藏
页码:479 / +
页数:2
相关论文
共 50 条
  • [1] Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
    Xie, Qi
    Wang, Guilin
    Xia, Fubiao
    Chen, Deren
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1038 - 1051
  • [2] A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
    Chande, Manoj Kumar
    Lee, Cheng-Chi
    Li, Chun-Ta
    PARALLEL PROCESSING LETTERS, 2016, 26 (04)
  • [3] Self-Certified Multi-authenticated Encryption Scheme
    Tsai, Jia-Lun
    Wu, Tzong-Chen
    Tsai, Kuo-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 917 - 922
  • [4] Practical convertible authenticated encryption schemes using self-certified public keys
    Lv, JQ
    Wang, XM
    Kim, K
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1285 - 1297
  • [5] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122
  • [6] Cryptanalysis and improvement of practical convertible authenticated encryption schemes using self-certified public keys
    Shao, Zuhua
    INFORMATICA, 2006, 17 (04) : 577 - 586
  • [7] Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System
    Wu, Tzong-Sun
    Chen, Yih-Sen
    Lin, Han-Yu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (03): : 1157 - 1177
  • [8] RPCAE: a novel revocable proxy convertible authenticated encryption scheme
    Lin, Han-Yu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (05) : 431 - 441
  • [9] RPCAE: a novel revocable proxy convertible authenticated encryption scheme
    Han-Yu Lin
    International Journal of Information Security, 2015, 14 : 431 - 441
  • [10] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209