Improvement of convertible authenticated encryption schemes and its multiple recipients version

Ting-Yi  Chang, Chou Chen Yang, Min Shiang Hwang

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au-thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message by using her/his secret key and verify the message by using the signer's public key. If there is a dispute, the recipient is able to convert the authenticated ciphertext signature into an ordinary signature that can be verified by anyone. This paper separately points out that any adversary can forge a converted signature in Araki's scheme and Ma-Chen's scheme. Moreover, we further improve the weakness in Wu-Hsu's scheme, which is to convert the signature into an ordinary one should divulge the message. The im-proved scheme not only solves the weakness but also reduces the computational complexities in both sides of signer and recipient. Furthermore, the proposed convertible authenticated encryption scheme is extended for multiple recipients. The message can be recovered and verified by a group with multiple recipients.

Original languageEnglish
Pages (from-to)151-162
Number of pages12
JournalInternational Journal of Security and its Applications
Issue number4
Publication statusPublished - 2012 Dec 1

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Improvement of convertible authenticated encryption schemes and its multiple recipients version'. Together they form a unique fingerprint.

Cite this