An Improved Authenticated Encryption Scheme

被引:3
|
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [1] Improved convertible authenticated encryption scheme with provable security
    Lin, Han-Yu
    Hsu, Chien-Lung
    Huang, Shih-Kun
    INFORMATION PROCESSING LETTERS, 2011, 111 (13) : 661 - 666
  • [2] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [3] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [4] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [5] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [6] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [7] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [8] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [9] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [10] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704