Security Analysis of a Convertible Multiauthenticated Encryption Scheme

Article Preview

Abstract:

Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group of signers to cooperatively produce a valid authenticated ciphertext so that only the specific recipient can recover the message and verify the signature. Recently, Wu et al. proposed a convertible multi-authenticated encryption scheme and claimed that the scheme was secure. In this paper, we show that Wu et. al’s scheme is not secure against rogue-key attacks. To overcome such attack, we give an improved multi-authenticated encryption scheme by including two hash functions. And our improved scheme is the same efficiency as Wu et.al.’s scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

111-115

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. nyberg and R.A. Rueppel, message recovery for signature schemes based on the discrete logarithm problem, Proc. First ACM Conferenceon Computer and Communications Security, (1993).

DOI: 10.1007/bfb0053434

Google Scholar

[2] M. Bellare and P. Rogaway, the exact security of digital signatures: how to sign with RSA and Rabin, Eurocrypt'96, LNCS 1070, pp.399-416, Springer-verlag, (1996).

DOI: 10.1007/3-540-68339-9_34

Google Scholar

[3] K. Nyberg and R.A. Rueppel, A new signature scheme based on the DSA giving message recovery, Eurocrypt'94, LNCS 950, pp.182-193, Springer-verlag, (1995).

DOI: 10.1007/bfb0053434

Google Scholar

[4] A. Miyaji, A message recovery signature scheme equivalent to DSA over elliptic curves, Asiacrypt'96, LNCS 1163, pp.1-14, springer-verlag, (1996).

DOI: 10.1007/bfb0034830

Google Scholar

[5] Tseng, Y. M, Jan, J. K, An Efficient Authenticated Encryption Scheme with Message Linkages and Low Communication Costs, Journal of Information Science and Engineering, Vol. 18, pp.41-56.

Google Scholar

[6] Wu, T.S., Hsu, C. L, Convertible Authenticated Encryption Scheme. The Journal of Systems and Software, Vol. 62. (2002) pp.205-209.

DOI: 10.1016/s0164-1212(01)00143-1

Google Scholar

[7] H. -F. Huang and C. -C. Chang. An Efficient Convertible Authenticated Encryption Scheme and its variant. Information and communications security , ICICS2003, LNCS 2836, pp.382-392, (2003).

DOI: 10.1007/978-3-540-39927-8_35

Google Scholar

[8] Guilin Wang, Robert H. Deng, Dongjin Kwak, and Sangjae Moon. Security Analysis of Two Signcryption Schemes. ISC 2004, LNCS 3225, pp.123-133. Springer-Verlag, (2004).

DOI: 10.1007/978-3-540-30144-8_11

Google Scholar

[9] T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, T.C. Wu, Convertible multiauthenticated encryption scheme, Information Sciences vol. 178 (1) , 2008, pp.256-263.

DOI: 10.1016/j.ins.2007.06.011

Google Scholar

[10] Jia-Lun Tsai, Convertible multi-authenticated encryption scheme with one-way hash function, Computer Communications 32 (2009) pp.783-786.

DOI: 10.1016/j.comcom.2008.12.009

Google Scholar