An Improved Authenticated Encryption Scheme

被引:3
|
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [31] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan H.
    Shen B.
    Miao X.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [32] A publicly verifiable authenticated encryption scheme with message linkages
    Peng, YQ
    Xie, SY
    Chen, YF
    Deng, R
    Peng, LX
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1271 - 1276
  • [33] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [34] Convertible Authenticated Encryption Scheme with Hierarchical Access Control
    Hsu, Chien-Lung
    Lin, Han-Yu
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
  • [35] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations
    Hsu, Chien-Lung
    Lin, Yu-Li
    Wu, Tzong-Chen
    Su, Chain-Hui
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
  • [36] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [37] A Convertible Multi Authenticated Encryption scheme for group communications
    Chang, Ting-Yi
    INFORMATION SCIENCES, 2008, 178 (17) : 3426 - 3434
  • [38] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
    Khovratovich, Dmitry
    Rechberger, Christian
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184
  • [39] An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
    Huang, Wen
    Liao, Yongjian
    Zhou, Shijie
    Chen, Hongjie
    IEEE ACCESS, 2019, 7 : 43453 - 43461
  • [40] A new convertible authenticated encryption scheme with message linkages
    Tzeng, Shiang-Feng
    Tang, Yuan-Liang
    Hwang, Min-Shiang
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 133 - 138