A Secure and Efficient Convertible Authenticated Encryption Scheme with Message Linkages Using Elliptic Curve Cryptosystem
نویسندگان
چکیده
A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates his/her signature by adding conversion phase. (2) It can greatly reduce computation efforts for that the tasks of verifying the signature and authenticating the public key can be simultaneously carried out in one step. (3) It is Corresponding author: Kee-Young Yoo ([email protected]) 6310 Eun-Jun Yoon and Kee-Young Yoo practical because it not only provides computational efficiency but also achieves all security requirements. Mathematics Subject Classification: 94A60, 11T71, 14G50, 68P25, 81P94
منابع مشابه
A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...
متن کاملDigital signature with message recovery and its variants based on elliptic curve discrete logarithm problem
In this article, we shall adopt the concepts of elliptic curve cryptosystems and self-certified public keys to build a novel digital signature scheme with message recovery. The public key and the identity of the user can be authenticated simultaneously in recovering the message. In addition, we shall also present three extended digital signature schemes based on the proposed scheme. The first i...
متن کاملImprovement on a Threshold Authenticated Encryption Scheme
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encry...
متن کاملConvertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem
Abstract: The work presents a Convertible Multi-Authenticated Encryption (CMAE) scheme based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed scheme intended to develop the CMAE scheme to improve performance as compared to the other existing schemes. Most of CMAE scheme are very high at computational overhead and memory usage problem. This scheme desired to reduce time-con...
متن کاملECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems
This paper presents an ECC (Elliptic Curve Cryptography) based convertible authenticated encryption (CAE) scheme using self-certified public key systems. Combining the merits of self-certified public key cryptosystems, the proposed scheme has the property that authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing comput...
متن کامل