An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security

被引:9
|
作者
Kar, Jayaprakash [1 ]
Naik, Kshirasagar [2 ]
Abdelkader, Tamer [3 ]
机构
[1] LNM Inst Informat Technol, Dept Comp Sci & Engn, Ctr Cryptog Cyber Secur & Digital Forens, Jaipur 302031, Rajasthan, India
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[3] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
关键词
e-mail security; data integrity; non-repudiation; deniable authentication; DESIGN;
D O I
10.1109/ACCESS.2019.2960291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most important security requirements to secure electronic mail (e-mail) systems are: confidentiality, authentication, non-repudiation and data integrity. In conventional e-mail systems, Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) digital envelops are used to satisfy these security requirements. However, confidentiality and authentication are performed in two different phases, which increases computations and leads to more energy consumption. Moreover, the receiver can easily reveal the source of the message, violating the sender's privacy. In this paper, we propose a low-cost deniably authenticated encryption scheme (DA-ENS), where all the cryptographic primitives are being performed in a single logical step to achieve these goals. Experimental results show that our scheme, DA-ENS, achieves low computational cost and communication overhead at 80-bit, 112-bit, 128-bit, 192-bit and 256-bit security levels. Energy consumption is shown to be reduced to 80%, 67%, 42%, 62% and 48% compared to similar schemes SL+BF, LXJ+BF, Fagen Li et al. (FL), AJL and CZJZJSZ respectively. Also, we have proven that, our scheme DA-ENS is provably secure in random oracle model.
引用
收藏
页码:184207 / 184220
页数:14
相关论文
共 50 条
  • [31] E-mail encryption methods and lawful interception methods of it
    Jeong, Young Sic
    Kang, Shin Gak
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 29 - 32
  • [32] Secure e-mail and databases using chaotic encryption
    Sobhy, MI
    Shehata, AE
    [J]. ELECTRONICS LETTERS, 2000, 36 (10) : 875 - 876
  • [33] Bubble bursts illusion of e-mail security
    Sample, I
    [J]. NEW SCIENTIST, 1999, 164 (2213) : 24 - 24
  • [34] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
    Huang, Wen
    Liao, Yongjian
    Zhou, Shijie
    Chen, Hongjie
    [J]. IEEE ACCESS, 2019, 7 : 43453 - 43461
  • [35] Research on an E-mail Encryption Protocol Based on Quantum Teleportation
    Xiao Shufen
    Dong Yumin
    Ma Hongyang
    Chen Libo
    [J]. International Journal of Theoretical Physics, 2016, 55 : 4773 - 4784
  • [36] A Lightweight 1.16 pJ/bit Processor for the Authenticated Encryption Scheme KetjeSR
    Lu, Yun-Wen
    Purnal, Antoon
    Vandenhende, Simon
    Lee, Chen-Yi
    Verbauwhede, Ingrid
    Chang, Hsie-Chia
    [J]. 2019 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2019,
  • [37] Usability of End-to-End Encryption in E-Mail Communication
    Reuter, Adrian
    Abdelmaksoud, Ahmed
    Boudaoud, Karima
    Winckler, Marco
    [J]. FRONTIERS IN BIG DATA, 2021, 4
  • [38] E-mail rules: A business guide to managing policies, security, and legal issues for e-mail and digital communication
    Wiley, DL
    [J]. ONLINE, 2003, 27 (05): : 63 - 63
  • [39] More tips for efficient e-mail use
    Harris, M
    Price, S
    Keim-Trewyn, D
    [J]. HOSPITALS & HEALTH NETWORKS, 2005, 79 (06): : 10 - +
  • [40] Research on an E-mail Encryption Protocol Based on Quantum Teleportation
    Xiao Shufen
    Dong Yumin
    Ma Hongyang
    Chen Libo
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (11) : 4773 - 4784