An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security

被引:9
|
作者
Kar, Jayaprakash [1 ]
Naik, Kshirasagar [2 ]
Abdelkader, Tamer [3 ]
机构
[1] LNM Inst Informat Technol, Dept Comp Sci & Engn, Ctr Cryptog Cyber Secur & Digital Forens, Jaipur 302031, Rajasthan, India
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
e-mail security; data integrity; non-repudiation; deniable authentication; DESIGN;
D O I
10.1109/ACCESS.2019.2960291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most important security requirements to secure electronic mail (e-mail) systems are: confidentiality, authentication, non-repudiation and data integrity. In conventional e-mail systems, Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) digital envelops are used to satisfy these security requirements. However, confidentiality and authentication are performed in two different phases, which increases computations and leads to more energy consumption. Moreover, the receiver can easily reveal the source of the message, violating the sender's privacy. In this paper, we propose a low-cost deniably authenticated encryption scheme (DA-ENS), where all the cryptographic primitives are being performed in a single logical step to achieve these goals. Experimental results show that our scheme, DA-ENS, achieves low computational cost and communication overhead at 80-bit, 112-bit, 128-bit, 192-bit and 256-bit security levels. Energy consumption is shown to be reduced to 80%, 67%, 42%, 62% and 48% compared to similar schemes SL+BF, LXJ+BF, Fagen Li et al. (FL), AJL and CZJZJSZ respectively. Also, we have proven that, our scheme DA-ENS is provably secure in random oracle model.
引用
收藏
页码:184207 / 184220
页数:14
相关论文
共 50 条
  • [1] Efficient Deniably Authenticated Encryption and Its Application to E-Mail
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2477 - 2486
  • [2] Deniable authenticated encryption for e-mail applications
    Jin, Chunhua
    Chen, Guanhua
    Yu, Changhui
    Zhao, Jianyang
    [J]. International Journal of Computers and Applications, 2020, 42 (05): : 429 - 438
  • [3] On the security of a certified E-mail scheme
    Wang, GL
    Bao, F
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 48 - 60
  • [4] IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON
    Al-Shatari, Mohammed
    Hussin, Fawnizu Azmadi
    Aziz, Azrina Abd
    Eisa, Taiseer Abdalla Elfadil
    Tran, Xuan-Tu
    Dalam, Mhassen Elnour Elneel
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (18):
  • [5] On the security of a certified e-mail scheme with temporal authentication
    Shao, MH
    Zhou, JY
    Wang, GL
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 701 - 710
  • [6] SECURITY OF E-MAIL
    DUBB, HE
    [J]. SCIENCE, 1993, 262 (5135) : 827 - 827
  • [7] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    [J]. TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639
  • [8] Identity-based deniable authenticated encryption and its application to e-mail system
    Fagen Li
    Zhaohui Zheng
    Chunhua Jin
    [J]. Telecommunication Systems, 2016, 62 : 625 - 639
  • [9] E-MAIL SECURITY FRAMEWORK THROUGH VARIOUS VIRUS ENCRYPTION TECHNIQUES
    Bhatt, Ashutosh Prasad
    Sharma, Monika
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 134 - 138
  • [10] Certificateless deniably authenticated encryption and its application to e-voting system
    Emmanuel Ahene
    Chunhua Jin
    Fagen Li
    [J]. Telecommunication Systems, 2019, 70 : 417 - 434