An efficient authenticated encryption scheme with message linkages and low communication costs

Yuh-Min Tseng, Jinn Ke Jan

Research output: Contribution to journalArticle

21 Citations (Scopus)

Abstract

An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.

Original languageEnglish
Pages (from-to)41-46
Number of pages6
JournalJournal of Information Science and Engineering
Volume18
Issue number1
Publication statusPublished - 2002 Jan 1

Fingerprint

Cryptography
privacy
integrity
communications
communication
Communication
costs
Costs
Hash functions
Bandwidth
Recovery
time

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Hardware and Architecture
  • Computational Theory and Mathematics
  • Library and Information Sciences

Cite this

@article{2bb406d8bee54f248dbabab0b6648cb8,
title = "An efficient authenticated encryption scheme with message linkages and low communication costs",
abstract = "An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.",
author = "Yuh-Min Tseng and Jan, {Jinn Ke}",
year = "2002",
month = "1",
day = "1",
language = "English",
volume = "18",
pages = "41--46",
journal = "Journal of Information Science and Engineering",
issn = "1016-2364",
publisher = "Institute of Information Science",
number = "1",

}

An efficient authenticated encryption scheme with message linkages and low communication costs. / Tseng, Yuh-Min; Jan, Jinn Ke.

In: Journal of Information Science and Engineering, Vol. 18, No. 1, 01.01.2002, p. 41-46.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An efficient authenticated encryption scheme with message linkages and low communication costs

AU - Tseng, Yuh-Min

AU - Jan, Jinn Ke

PY - 2002/1/1

Y1 - 2002/1/1

N2 - An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.

AB - An efficient authenticated encryption scheme with message linkages is proposed. For achieving both privacy and integrity in data communications, the proposed scheme requires smaller bandwidth and computational time when compared to previously proposed authenticated encryption schemes with message linkages. Moreover, the proposed scheme allows the verifier to recover and verify the message blocks simultaneously, and hence, the message recovery phase could be speeded up. The security of the proposed scheme is based on the authenticated encryption scheme as well as the one-way hash cryptographic function assumption.

UR - http://www.scopus.com/inward/record.url?scp=0036196020&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0036196020&partnerID=8YFLogxK

M3 - Article

VL - 18

SP - 41

EP - 46

JO - Journal of Information Science and Engineering

JF - Journal of Information Science and Engineering

SN - 1016-2364

IS - 1

ER -