© The Institution of Engineering and Technology
In 2009, Tsai proposed an efficient convertible multi-authenticated encryption (CMAE) scheme. However, the author shows that his scheme is distinguishable under adaptive chosen-message attack, and that the designated verifier can generate the signature of the same message for other verifiers. Since no formal model of CMAE has been presented in the literature, the author presents the first complete formal model of CMAE. Then, a new scheme is proposed. The proposed scheme is provably secure in the random oracle model.
References
-
-
1)
-
J. Lv ,
X. Wang ,
K. Kim
.
Practical convertible authenticated encryption schemes using self-certified public keys.
Appl. Math. Comput.
,
2 ,
1285 -
1297
-
2)
-
Zheng, Y.: `Signcryption and its application in efficient public key solutions', ISW, 1997, p. 291–312, (LNCS, 1396).
-
3)
-
C.C. Lee ,
M.S. Hwang ,
S.F. Tzeng
.
A new convertible authenticated encryption scheme based on the ElGamal cryptosystem.
Int. J. Found. Comput. Sci.
,
2 ,
351 -
359
-
4)
-
Huang, H., Chang, C.: `An efficient convertible authenticated encryption scheme and its variant', Proc. Int. Conf. on Information and Communications Security (ICICS 2003), 2003, p. 382–392, (LNCS, 2836).
-
5)
-
W.H. He ,
T.C. Wu
.
Cryptanalysis and improvement of Petersen–Michels signcryption scheme.
IEE Proc. Comput. Digit. Tech.
,
2 ,
123 -
124
-
6)
-
J.L. Tsai
.
Convertible multi-authenticated encryption scheme with one-way hash function.
Comput. Commun.
,
783 -
786
-
7)
-
F. Li ,
Z. Qin
.
Cryptanalysis of a convertible authenticated encryption scheme based on the ElGamal cryptosystem.
IETE Tech. Rev.
,
266 -
269
-
8)
-
T.S. Wu ,
H.Y. Lin
.
Secure convertible authenticated encryption scheme based on RSA.
Informatica
,
481 -
486
-
9)
-
S. Araki ,
S. Uehara ,
K. Imamura
.
The limited verifier signature and its application.
IEICE Trans. Fundam.
,
1 ,
63 -
68
-
10)
-
H. Petersen ,
M. Michels
.
Cryptanalysis and improvement of signcryption schemes.
IEE Proc. Comput. Digit. Tech.
,
2 ,
149 -
151
-
11)
-
P. Horster ,
M. Michels ,
H. Petersen
.
Authenticated encryption schemes with low communication costs.
Electron. Lett.
,
15 ,
1212 -
1213
-
12)
-
D. Pointcheval ,
J. Stern
.
Security arguments for digital signatures and blind signatures.
J. Cryptol.
,
3 ,
361 -
396
-
13)
-
H.Y. Chien
.
Convertible authenticated encryption scheme without using conventional one-way function.
Informatica
,
4 ,
1 -
9
-
14)
-
T.S. Wu ,
C.L. Hsu
.
Convertible authenticated encryption scheme.
J. Syst. Softw.
,
205 -
209
-
15)
-
T.S. Wu ,
C.L. Hsu ,
K.Y. Tsai ,
H.Y. Lin ,
T.C. Wu
.
Convertible multi-authenticated encryption scheme.
Inf. Sci.
,
1 ,
256 -
263
-
16)
-
Bao, F., Deng, R.H.: `A signcryption scheme with signature directly verifiable by public key', PKC, 1998, p. 55–59, (LNCS, 1431).
-
17)
-
L. Harn
.
Group-oriented (t, n) threshold signature and digital multisignature.
IEE Proc., Comput. Digit. Tech.
,
5 ,
307 -
313
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0162
Related content
content/journals/10.1049/iet-ifs.2011.0162
pub_keyword,iet_inspecKeyword,pub_concept
6
6