A secure authenticated encryption scheme and its extension

被引:0
|
作者
Zhang, Jianhong [1 ]
Cheng, Ji [1 ]
机构
[1] N China Univ Technol, Inst Image Proc & Pattern Recogint, Beijing, Peoples R China
关键词
digital signature; random oracle; authentication encryption scheme; security proof; message recovery;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a message. In the large message transmission, traditional authenticated encryption schemes have the disadvantage that communication overheads and the computation costs are too high. In this work, we propose a secure authentication encryption scheme and show that the scheme is secure in the random oracle model. Comparisons of our proposed scheme with Wu-Hsus scheme and Huang-Changs scheme, the proposed scheme is more efficient for computation complexity and communication cost. Finally, we extend our proposed scheme to adapt to the authenticated encryption for a large message, which is secure against the message block being reordered, replicated or partially deleted during transmission.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [1] A novel authenticated encryption scheme and its extension
    Zhang, Jianhong
    Zhao, Xubing
    Ji, Cheng
    INFORMATION SCIENCES, 2015, 317 : 196 - 201
  • [2] TriviA: A Fast and Secure Authenticated Encryption Scheme
    Chakraborti, Avik
    Chattopadhyay, Anupam
    Hassan, Muhammad
    Nandi, Mridul
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
  • [3] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [4] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [5] Provably secure convertible multi-authenticated encryption scheme
    Xie, Q.
    IET INFORMATION SECURITY, 2012, 6 (02) : 65 - 70
  • [6] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [7] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [8] Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation
    Choi, Wonseok
    Lee, Byeonghak
    Lee, Jooyoung
    Lee, Yeongmin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 : 407 - 434
  • [9] A New Forward-Secure Authenticated Encryption Scheme with Message Linkages
    LI Yanping~ 1
    2. College of Mathematics and Information Science
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1537 - 1540
  • [10] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193