Skip to main content

2014 | OriginalPaper | Buchkapitel

A New Threshold-Authenticated Encryption Scheme

verfasst von : Mohd Saiful Adli Mohamad, Eddie Shahril Ismail, Haslinda Ibrahim

Erschienen in: International Conference on Mathematical Sciences and Statistics 2013

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An authenticated encryption scheme is a message recovery scheme that provides the authenticity property. In an authenticated encryption scheme, the recipients not only verify the message authentication, but they also could recover the message. In this paper, we propose a new authenticated encryption scheme based on two hard number theoretical problems: factoring and discrete logarithm. In our new scheme, t out of n signers/senders are required to sign and at the same time encrypt a message, while k out of l recipients cooperate to verify and recover the original message. We also show that our scheme is secure against some cryptographic attacks and requires reasonable number of operations in both signature/encryption and verification/decryption phases.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)CrossRef Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)CrossRef
2.
Zurück zum Zitat Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)CrossRef Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)CrossRef
3.
Zurück zum Zitat Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998) Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998)
4.
Zurück zum Zitat Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988) Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
5.
Zurück zum Zitat Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992) Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
7.
Zurück zum Zitat Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000) Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000)
8.
Zurück zum Zitat Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)CrossRefMATHMathSciNet Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)CrossRefMATHMathSciNet
9.
Zurück zum Zitat Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)CrossRefMATHMathSciNet Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)CrossRefMATHMathSciNet
10.
Zurück zum Zitat ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)CrossRefMATHMathSciNet ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)CrossRefMATHMathSciNet
Metadaten
Titel
A New Threshold-Authenticated Encryption Scheme
verfasst von
Mohd Saiful Adli Mohamad
Eddie Shahril Ismail
Haslinda Ibrahim
Copyright-Jahr
2014
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-4585-33-0_25