Skip to main content
Top

2014 | OriginalPaper | Chapter

A New Threshold-Authenticated Encryption Scheme

Authors : Mohd Saiful Adli Mohamad, Eddie Shahril Ismail, Haslinda Ibrahim

Published in: International Conference on Mathematical Sciences and Statistics 2013

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An authenticated encryption scheme is a message recovery scheme that provides the authenticity property. In an authenticated encryption scheme, the recipients not only verify the message authentication, but they also could recover the message. In this paper, we propose a new authenticated encryption scheme based on two hard number theoretical problems: factoring and discrete logarithm. In our new scheme, t out of n signers/senders are required to sign and at the same time encrypt a message, while k out of l recipients cooperate to verify and recover the original message. We also show that our scheme is secure against some cryptographic attacks and requires reasonable number of operations in both signature/encryption and verification/decryption phases.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)CrossRef Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)CrossRef
2.
go back to reference Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)CrossRef Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)CrossRef
3.
go back to reference Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998) Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998)
4.
go back to reference Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988) Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
5.
go back to reference Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992) Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
7.
go back to reference Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000) Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000)
8.
go back to reference Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)CrossRefMATHMathSciNet Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)CrossRefMATHMathSciNet
9.
go back to reference Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)CrossRefMATHMathSciNet Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)CrossRefMATHMathSciNet
10.
go back to reference ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)CrossRefMATHMathSciNet ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)CrossRefMATHMathSciNet
Metadata
Title
A New Threshold-Authenticated Encryption Scheme
Authors
Mohd Saiful Adli Mohamad
Eddie Shahril Ismail
Haslinda Ibrahim
Copyright Year
2014
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-4585-33-0_25

Premium Partner