An efficient authenticated encryption scheme with message linkages and low communication costs

被引:0
|
作者
Tseng, YM [1 ]
Jan, JK
机构
[1] Nan Kai Coll Technol & Commerce, Dept Informat Management, Nantou 542, Taiwan
[2] Natl Chunghsing Univ, Inst Appl Math, Taichung 402, Taiwan
关键词
cryptography; authentication; encryption; message linkage; signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 50 条
  • [31] Message Franking via Committing Authenticated Encryption
    Grubbs, Paul
    Lu, Jiahui
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 66 - 97
  • [32] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [33] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704
  • [34] An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE ACCESS, 2019, 7 : 184207 - 184220
  • [35] A more efficient public-key authenticated encryption scheme with keyword search
    Huang, Qiong
    Huang, Peisen
    Li, Hongbo
    Huang, Jianye
    Lin, Hongyuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 137
  • [36] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
    Yang, Jen-Ho
    Chang, Ya-Fen
    Chen, Yi-Hui
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
  • [37] An Efficient Scheme for Authenticated and Secure Message Delivery in Vehicular Ad Hoc Networks
    Lim, Kiho
    Manivannan, D.
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 162 - 163
  • [38] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [39] Authenticated encryption schemes with message linkage for threshold signatures
    Huang, CH
    Lee, CY
    Lin, CH
    Chang, CC
    Chen, KL
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 261 - 264
  • [40] Authenticated encryption schemes with linkage between message blocks
    Lee, WB
    Chang, CC
    INFORMATION PROCESSING LETTERS, 1997, 63 (05) : 247 - 250