A Novel Convertible Authenticated Encryption Scheme based on RSA Assumption
نویسنده
چکیده
An authenticated encryption allows the specific recipient to verify the authenticity while recovering the message. To protect the recipient’s interest in case of a later dispute, a convertible authenticated encryption scheme allows the specific recipient to retrieve an authenticated cipher text and convert the authenticated ciphertext into an ordinary signature so that it becomes publicly verifiable. In this paper, we propose a novel and secure convertible authenticated encryption scheme based on RSA assumption. The proposed scheme allows the specific recipient to convert the authenticated ciphertext into an ordinary signature without extra computation efforts or communication overheads. To analyze the security of our proposed scheme, we use the techniques from provable security.
منابع مشابه
Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function
An authenticated encryption allows the designated recipient to verify the authenticity while recovering the message. To protect the recipient’s benefit in case of a later dispute, a convertible authenticated encryption scheme allows the recipient to convert the authenticated encryption into an ordinary signature so that it becomes a publicly verifiable. This paper shows a universal forgery atta...
متن کاملSecure Convertible Authenticated Encryption Scheme Based on RSA
A convertible authenticated encryption (CAE) scheme is a better way to simultaneously provide cryptographic schemes with the properties of confidentiality, authenticity and non-repudiation. The authors propose a RSA based secure CAE scheme which is different from previously proposed ones based on the discrete logarithms or elliptic curve discrete logarithms. The proposed scheme has the nice arb...
متن کاملConvertible Authenticated Encryption Scheme with Hierarchical Access Control
Convertible authenticated encryption (CAE) scheme with hierarchical access control has crucial benefits to the transmission of digital evidence. Such a scheme allows a judicial policeman to generate an authenticated ciphertext and only a designated investigator of Investigation of Bureau, Ministry of Justice (MJIB) has the ability to decrypt the ciphertext and verify the corresponding signature...
متن کاملConvertible multi-authenticated encryption scheme with one-way hash function
To send the message to the recipient securely, authenticated encryption schemes were proposed. In 2008, Wu et al. [T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, T.C. Wu, Convertible multi-authenticated encryption scheme, Information Sciences 178 (1) 256–263.] first proposed a convertible multi-authenticated encryption scheme based on discrete logarithms. However, the author finds that the computation...
متن کاملNew identity-based key-insulated convertible multi-authenticated encryption scheme
Elaborating on the merits of convertible multi-authenticated encryption (CMAE) schemes and keyinsulated systems, we propose a novel identity-based key-insulated convertible multi-authenticated encryption scheme (IB-KI-CMAE), which can effectively reduce the impact caused by the key exposure. Our scheme allows each user to periodically update his private key while the corresponding public one re...
متن کامل