Self-Certified Proxy Convertible Authenticated Encryption Scheme

被引:2
|
作者
Lin, Han-Yu [1 ]
Wu, Tzong-Sun [2 ]
Huan, Ting-Yu [1 ]
Yeh, Yi-Shiung [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[2] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Hsinchu, Taiwan
关键词
self-certified; proxy signature; convertible; authenticated encryption;
D O I
10.1109/ISDA.2008.139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy convertible authenticated encryption (CAE) scheme allows an original signer to delegate his signing power to a proxy signer such that the proxy signer can generate an authenticated ciphertext on behalf of the original signer The generated authenticated ciphertext can only be decrypted and verified by the specific recipient instead of everyone else for the purpose of confidentiality. Integrating with self-certified public key systems, the proposed scheme can save more communication overheads and computation efforts, since it is not necessary to transmit and verify the public key certificate. That is, authenticating the public key can be combined with subsequent cryptographic operations such as the signature verification. In case of a later repudiation, the specific recipient has the ability to convert the signature into an ordinary one for convincing anyone of the signer dishonesty.
引用
收藏
页码:479 / +
页数:2
相关论文
共 50 条
  • [21] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [22] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434
  • [23] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [25] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [26] Security analysis of a threshold proxy signature scheme using self-certified public keys
    Lu, Rong-Bo
    He, Da-Ke
    Wang, Chang-Ji
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2008, 40 (02): : 91 - 95
  • [27] Convertible multi-authenticated encryption scheme for data communication
    Huang, Hui-Feng
    Lin, Pin-Han
    Tsai, Min-Hsuan
    International Journal of Network Security, 2015, 17 (01) : 40 - 48
  • [28] A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2009, 20 (02) : 351 - 359
  • [29] An efficient convertible authenticated encryption-scheme and its variant
    Huang, HF
    Chang, CC
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392
  • [30] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70