An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security

被引:9
|
作者
Kar, Jayaprakash [1 ]
Naik, Kshirasagar [2 ]
Abdelkader, Tamer [3 ]
机构
[1] LNM Inst Informat Technol, Dept Comp Sci & Engn, Ctr Cryptog Cyber Secur & Digital Forens, Jaipur 302031, Rajasthan, India
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
e-mail security; data integrity; non-repudiation; deniable authentication; DESIGN;
D O I
10.1109/ACCESS.2019.2960291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most important security requirements to secure electronic mail (e-mail) systems are: confidentiality, authentication, non-repudiation and data integrity. In conventional e-mail systems, Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) digital envelops are used to satisfy these security requirements. However, confidentiality and authentication are performed in two different phases, which increases computations and leads to more energy consumption. Moreover, the receiver can easily reveal the source of the message, violating the sender's privacy. In this paper, we propose a low-cost deniably authenticated encryption scheme (DA-ENS), where all the cryptographic primitives are being performed in a single logical step to achieve these goals. Experimental results show that our scheme, DA-ENS, achieves low computational cost and communication overhead at 80-bit, 112-bit, 128-bit, 192-bit and 256-bit security levels. Energy consumption is shown to be reduced to 80%, 67%, 42%, 62% and 48% compared to similar schemes SL+BF, LXJ+BF, Fagen Li et al. (FL), AJL and CZJZJSZ respectively. Also, we have proven that, our scheme DA-ENS is provably secure in random oracle model.
引用
收藏
页码:184207 / 184220
页数:14
相关论文
共 50 条
  • [21] SECURE E-MAIL CHEAPLY WITH SOFTWARE ENCRYPTION
    STRAUSS, P
    [J]. DATAMATION, 1993, 39 (23): : 48 - &
  • [22] A proxy approach to e-mail security
    Brown, I
    Snow, CR
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1999, 29 (12): : 1049 - 1060
  • [23] Double trouble for e-mail security
    Hoffman, P
    [J]. BYTE, 1998, 23 (05): : 40 - 40
  • [24] Computer security bulletins by e-mail
    不详
    [J]. JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2004, 135 (04): : 426 - 426
  • [25] An improved e-mail security protocol
    Schneier, B
    Hall, C
    [J]. 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [26] E-mail security gets personal
    Paulson, LD
    [J]. COMPUTER, 2004, 37 (01) : 26 - 26
  • [28] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    [J]. 2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +
  • [29] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [30] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666