Provably secure convertible multi-authenticated encryption scheme

Access Full Text

Provably secure convertible multi-authenticated encryption scheme

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In 2009, Tsai proposed an efficient convertible multi-authenticated encryption (CMAE) scheme. However, the author shows that his scheme is distinguishable under adaptive chosen-message attack, and that the designated verifier can generate the signature of the same message for other verifiers. Since no formal model of CMAE has been presented in the literature, the author presents the first complete formal model of CMAE. Then, a new scheme is proposed. The proposed scheme is provably secure in the random oracle model.

Inspec keywords: cryptography

Other keywords: convertible multiauthenticated encryption scheme; random oracle model; adaptive chosen-message attack; CMAE

Subjects: Data security; Cryptography

References

    1. 1)
    2. 2)
      • Zheng, Y.: `Signcryption and its application in efficient public key solutions', ISW, 1997, p. 291–312, (LNCS, 1396).
    3. 3)
    4. 4)
      • Huang, H., Chang, C.: `An efficient convertible authenticated encryption scheme and its variant', Proc. Int. Conf. on Information and Communications Security (ICICS 2003), 2003, p. 382–392, (LNCS, 2836).
    5. 5)
    6. 6)
    7. 7)
    8. 8)
      • T.S. Wu , H.Y. Lin . Secure convertible authenticated encryption scheme based on RSA. Informatica , 481 - 486
    9. 9)
      • S. Araki , S. Uehara , K. Imamura . The limited verifier signature and its application. IEICE Trans. Fundam. , 1 , 63 - 68
    10. 10)
    11. 11)
    12. 12)
    13. 13)
      • H.Y. Chien . Convertible authenticated encryption scheme without using conventional one-way function. Informatica , 4 , 1 - 9
    14. 14)
    15. 15)
    16. 16)
      • Bao, F., Deng, R.H.: `A signcryption scheme with signature directly verifiable by public key', PKC, 1998, p. 55–59, (LNCS, 1431).
    17. 17)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0162
Loading

Related content

content/journals/10.1049/iet-ifs.2011.0162
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading