An Improved Authenticated Encryption Scheme

被引:3
|
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [21] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [22] A novel authenticated encryption scheme and its extension
    Zhang, Jianhong
    Zhao, Xubing
    Ji, Cheng
    INFORMATION SCIENCES, 2015, 317 : 196 - 201
  • [23] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +
  • [24] Robust authenticated encryption scheme with message linkages
    Yoon, EJ
    Yoo, KY
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 : 281 - 288
  • [25] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [26] On the security of two improved authenticated encryption schemes
    Informatics Department, Electronics Research Institute, Cairo, Egypt
    Int. J. Secur. Netw., 2013, 4 (194-199):
  • [27] Analysis of Authenticated Encryption Scheme for Wireless Sensor Networks
    Siddiqui, Adeel Ahmed
    Pirzada, Syed Jahanzeb Hussain
    2013 INTERNATIONAL CONFERENCE ON AEROSPACE SCIENCE & ENGINEERING (ICASE), 2013, : 27 - 30
  • [28] Authenticated encryption scheme with (t, n) shared verification
    Hsu, CL
    Wu, TC
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 117 - 120
  • [29] EnCash: An Authenticated Encryption Scheme Using Cellular Automata
    Banerjee, Tapadyoti
    Chowdhury, Dipanwita Roy
    JOURNAL OF CELLULAR AUTOMATA, 2022, 16 (5-6) : 443 - 461
  • [30] Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Kang, Jinkeon
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 22