Improvement of convertible authenticated encryption schemes and its multiple recipients version

Ting-Yi  Chang, Chou Chen Yang, Min Shiang Hwang

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au-thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message by using her/his secret key and verify the message by using the signer's public key. If there is a dispute, the recipient is able to convert the authenticated ciphertext signature into an ordinary signature that can be verified by anyone. This paper separately points out that any adversary can forge a converted signature in Araki's scheme and Ma-Chen's scheme. Moreover, we further improve the weakness in Wu-Hsu's scheme, which is to convert the signature into an ordinary one should divulge the message. The im-proved scheme not only solves the weakness but also reduces the computational complexities in both sides of signer and recipient. Furthermore, the proposed convertible authenticated encryption scheme is extended for multiple recipients. The message can be recovered and verified by a group with multiple recipients.

Original languageEnglish
Pages (from-to)151-162
Number of pages12
JournalInternational Journal of Security and its Applications
Volume6
Issue number4
Publication statusPublished - 2012 Dec 1

Fingerprint

Cryptography
Authentication
Computational complexity

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

@article{e3ef86c9ce0a4e9581214cc4079c8c04,
title = "Improvement of convertible authenticated encryption schemes and its multiple recipients version",
abstract = "A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au-thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message by using her/his secret key and verify the message by using the signer's public key. If there is a dispute, the recipient is able to convert the authenticated ciphertext signature into an ordinary signature that can be verified by anyone. This paper separately points out that any adversary can forge a converted signature in Araki's scheme and Ma-Chen's scheme. Moreover, we further improve the weakness in Wu-Hsu's scheme, which is to convert the signature into an ordinary one should divulge the message. The im-proved scheme not only solves the weakness but also reduces the computational complexities in both sides of signer and recipient. Furthermore, the proposed convertible authenticated encryption scheme is extended for multiple recipients. The message can be recovered and verified by a group with multiple recipients.",
author = "Ting-Yi  Chang and Yang, {Chou Chen} and Hwang, {Min Shiang}",
year = "2012",
month = "12",
day = "1",
language = "English",
volume = "6",
pages = "151--162",
journal = "International Journal of Security and its Applications",
issn = "1738-9976",
publisher = "Science and Engineering Research Support Society",
number = "4",

}

Improvement of convertible authenticated encryption schemes and its multiple recipients version. / Chang, Ting-Yi ; Yang, Chou Chen; Hwang, Min Shiang.

In: International Journal of Security and its Applications, Vol. 6, No. 4, 01.12.2012, p. 151-162.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Improvement of convertible authenticated encryption schemes and its multiple recipients version

AU - Chang, Ting-Yi 

AU - Yang, Chou Chen

AU - Hwang, Min Shiang

PY - 2012/12/1

Y1 - 2012/12/1

N2 - A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au-thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message by using her/his secret key and verify the message by using the signer's public key. If there is a dispute, the recipient is able to convert the authenticated ciphertext signature into an ordinary signature that can be verified by anyone. This paper separately points out that any adversary can forge a converted signature in Araki's scheme and Ma-Chen's scheme. Moreover, we further improve the weakness in Wu-Hsu's scheme, which is to convert the signature into an ordinary one should divulge the message. The im-proved scheme not only solves the weakness but also reduces the computational complexities in both sides of signer and recipient. Furthermore, the proposed convertible authenticated encryption scheme is extended for multiple recipients. The message can be recovered and verified by a group with multiple recipients.

AB - A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au-thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message by using her/his secret key and verify the message by using the signer's public key. If there is a dispute, the recipient is able to convert the authenticated ciphertext signature into an ordinary signature that can be verified by anyone. This paper separately points out that any adversary can forge a converted signature in Araki's scheme and Ma-Chen's scheme. Moreover, we further improve the weakness in Wu-Hsu's scheme, which is to convert the signature into an ordinary one should divulge the message. The im-proved scheme not only solves the weakness but also reduces the computational complexities in both sides of signer and recipient. Furthermore, the proposed convertible authenticated encryption scheme is extended for multiple recipients. The message can be recovered and verified by a group with multiple recipients.

UR - http://www.scopus.com/inward/record.url?scp=84872832940&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872832940&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84872832940

VL - 6

SP - 151

EP - 162

JO - International Journal of Security and its Applications

JF - International Journal of Security and its Applications

SN - 1738-9976

IS - 4

ER -