Paper Title:
Security Analysis of a Convertible Multiauthenticated Encryption Scheme
  Abstract

Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group of signers to cooperatively produce a valid authenticated ciphertext so that only the specific recipient can recover the message and verify the signature. Recently, Wu et al. proposed a convertible multi-authenticated encryption scheme and claimed that the scheme was secure. In this paper, we show that Wu et. al’s scheme is not secure against rogue-key attacks. To overcome such attack, we give an improved multi-authenticated encryption scheme by including two hash functions. And our improved scheme is the same efficiency as Wu et.al.’s scheme.

  Info
Periodical
Edited by
Dehuai Zeng
Pages
111-115
DOI
10.4028/www.scientific.net/AMR.159.111
Citation
J. H. Zhang, X. Liu, C. L. Liu, "Security Analysis of a Convertible Multiauthenticated Encryption Scheme", Advanced Materials Research, Vol. 159, pp. 111-115, 2011
Online since
December 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xuan Wu Zhou
Abstract:System optimization for key management is an essential method to facilitate the wide application of key management in cryptography protocols....
539
Authors: Xuan Wu Zhou
Abstract:As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography...
546
Authors: Young Hwa An
Abstract:In 2008, Bindu et al. proposed an improvement to Chien et al.'s remote password authentication scheme preserving user anonymity, and has...
184
Authors: Yu Lian Shang, Guo Qing Yang, Lan Hua Zhang, Yu Fei Zhang
Chapter 15: Information Security Technology
Abstract:Based on ElGamal system, a general authenticated encryption scheme characterized by (k, l) joint verification was put forward through...
2953
Authors: Yung Cheng Lee, Pei Ju Lee
Chapter 10: Computer and Information Technologies
Abstract:Nowadays, we can easily obtain variety of services through network. But due to the open environment, networks are vulnerable to variety of...
963