A secure authenticated encryption scheme and its extension

被引:0
|
作者
Zhang, Jianhong [1 ]
Cheng, Ji [1 ]
机构
[1] N China Univ Technol, Inst Image Proc & Pattern Recogint, Beijing, Peoples R China
关键词
digital signature; random oracle; authentication encryption scheme; security proof; message recovery;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a message. In the large message transmission, traditional authenticated encryption schemes have the disadvantage that communication overheads and the computation costs are too high. In this work, we propose a secure authentication encryption scheme and show that the scheme is secure in the random oracle model. Comparisons of our proposed scheme with Wu-Hsus scheme and Huang-Changs scheme, the proposed scheme is more efficient for computation complexity and communication cost. Finally, we extend our proposed scheme to adapt to the authenticated encryption for a large message, which is secure against the message block being reordered, replicated or partially deleted during transmission.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [21] An Improved Authenticated Encryption Scheme
    Li, Fagen
    Deng, Jiang
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) : 2171 - 2172
  • [22] Secure Fully Homomorphic Authenticated Encryption
    Kim, Jeongsu
    Yun, Aaram
    IEEE ACCESS, 2021, 9 : 107279 - 107297
  • [23] An efficient convertible authenticated encryption-scheme and its variant
    Huang, HF
    Chang, CC
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392
  • [24] Semantically secure authenticated encryption scheme and the same scheme for ad-hoc group called a ring
    Lee, Ji-Seon
    Chang, Jik Hyun
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 825 - +
  • [25] An authenticated re-encryption scheme for secure file transfer in named data networks
    Tseng, Yi-Fan
    Fan, Chun-I
    Cho, Yan-Fu
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [26] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [27] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [28] Unconditionally Secure Authenticated Encryption with Shorter Keys
    Alomair, Basel
    Poovendran, Radha
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
  • [29] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704
  • [30] Secure remote storage through authenticated encryption
    Hou, Fangyong
    Gu, Dawu
    Xiao, Nong
    Tang, Yuhua
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 3 - +