Key Assignment Scheme with Authenticated Encryption
نویسندگان
چکیده
منابع مشابه
Convertible authenticated encryption scheme
The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose. To protect the recipient’s benefit in the case of a...
متن کاملNew identity-based key-insulated convertible multi-authenticated encryption scheme
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and keyinsulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure. Our scheme allows each user to periodically update his private key while the corresponding public one re...
متن کاملKey Rotation for Authenticated Encryption
A common requirement in practice is to periodically rotate the keys used to encrypt stored data. Systems used by Amazon and Google do so using a hybrid encryption technique which is eminently practical but has questionable security in the face of key compromises and does not provide full key rotation. Meanwhile, symmetric updatable encryption schemes (introduced by Boneh et al. CRYPTO 2013) sup...
متن کاملImprovement on a Threshold Authenticated Encryption Scheme
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encry...
متن کاملTimed-Release Public Key Based Authenticated Encryption
In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Symmetric Cryptology
سال: 2018
ISSN: 2519-173X
DOI: 10.46586/tosc.v2018.i4.150-196