A secure authenticated encryption scheme and its extension

被引:0
|
作者
Zhang, Jianhong [1 ]
Cheng, Ji [1 ]
机构
[1] N China Univ Technol, Inst Image Proc & Pattern Recogint, Beijing, Peoples R China
关键词
digital signature; random oracle; authentication encryption scheme; security proof; message recovery;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a message. In the large message transmission, traditional authenticated encryption schemes have the disadvantage that communication overheads and the computation costs are too high. In this work, we propose a secure authentication encryption scheme and show that the scheme is secure in the random oracle model. Comparisons of our proposed scheme with Wu-Hsus scheme and Huang-Changs scheme, the proposed scheme is more efficient for computation complexity and communication cost. Finally, we extend our proposed scheme to adapt to the authenticated encryption for a large message, which is secure against the message block being reordered, replicated or partially deleted during transmission.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [41] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    Journal of Harbin Institute of Technology, 2007, (01) : 26 - 28
  • [42] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [43] Authenticated encryption scheme based on quadratic residue
    Chen, KF
    ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
  • [44] Adaptively secure broadcast encryption with authenticated content distributors
    Guo, Dianli
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7889 - 7910
  • [45] A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension
    Hu, Chengyu
    Liu, Pengtao
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT II, 2011, 215 : 131 - +
  • [46] Adaptively secure broadcast encryption with authenticated content distributors
    Dianli Guo
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Multimedia Tools and Applications, 2020, 79 : 7889 - 7910
  • [47] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [48] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [49] Dynamic Threshold Proxy Authenticated Encryption Scheme
    Song Yubo
    Hu Aiqun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4637 - 4640
  • [50] Convertible multi-authenticated encryption scheme
    Wu, Tzong-Sun
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    Lin, Han-Yu
    Wu, Tzong-Chen
    INFORMATION SCIENCES, 2008, 178 (01) : 256 - 263