An efficient authenticated encryption scheme with message linkages and low communication costs

被引:0
|
作者
Tseng, YM [1 ]
Jan, JK
机构
[1] Nan Kai Coll Technol & Commerce, Dept Informat Management, Nantou 542, Taiwan
[2] Natl Chunghsing Univ, Inst Appl Math, Taichung 402, Taiwan
关键词
cryptography; authentication; encryption; message linkage; signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [21] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [22] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [23] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [24] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [25] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [26] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [27] AN ENCRYPTION/SIGNATURE SCHEME WITH LOW MESSAGE EXPANSION
    HWANG, SJ
    CHANG, CC
    YANG, WP
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 1995, 18 (04) : 591 - 595
  • [28] EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTION
    Tsai, Jia-Lun
    Wu, Tzong-Sun
    Lin, Han-Yu
    Lee, Jong-Eao
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (09): : 3843 - 3852
  • [29] An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems
    Gui, Jinkun
    Yu, Yantao
    Zhou, Zeming
    Lu, Rongxing
    Mamun, Mohammad
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2676 - 2681
  • [30] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185