An Improved Authenticated Encryption Scheme

被引:3
|
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [41] Method of constructing elliptic curve authenticated encryption scheme
    Zhao, ZM
    Liu, FY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 146 - 151
  • [42] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70
  • [43] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [44] Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
    Granger, Robert
    Jovanovic, Philipp
    Mennink, Bart
    Neves, Samuel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 263 - 293
  • [45] Convertible multi-authenticated encryption scheme for data communication
    Huang, Hui-Feng
    Lin, Pin-Han
    Tsai, Min-Hsuan
    International Journal of Network Security, 2015, 17 (01) : 40 - 48
  • [46] Practical authenticated encryption scheme based on the elliptic curve cryptosystem
    Chen, TS
    Huang, KH
    Chung, YF
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 461 - 469
  • [47] The ring authenticated encryption scheme - How to provide a clue wisely
    Lv, Jiqiang
    Ren, Kui
    Chen, Xiaofeng
    Ki, Kwangjo
    INFORMATION SCIENCES, 2009, 179 (1-2) : 161 - 168
  • [48] A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 11 - 14
  • [49] The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme
    Simplicio, Marcos A., Jr.
    Barbuda, Pedro d'Aquino F. F. S.
    Barreto, Paulo S. L. M.
    Carvalho, Tereza C. M. B.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 165 - 180
  • [50] An efficient convertible authenticated encryption-scheme and its variant
    Huang, HF
    Chang, CC
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392