Proceedings ArticleDOI
Novel convertible authenticated encryption schemes without using hash functions
Xuhong Li,Wei Zhang,Xia Wang,Muhai Li +3 more
- Vol. 1, pp 504-508
Reads0
Chats0
TLDR
Based on the public discrete logarithm hard problem solely, this paper proposes a novel convertible authenticated encryption scheme without using hash functions, and extends it to a (t, n) threshold scheme.Abstract:
An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while keeping the message secret from the public, and a convertible authenticated encryption scheme enables the recipient to convert the signature to an ordinary one so that any third party can verify its validity. The paper shows a weaknesses in Chien's [3] convertible authenticated encryption scheme, then based on the public discrete logarithm hard problem solely, we propose a novel convertible authenticated encryption scheme without using hash functions, and extend it to a (t, n) threshold scheme. The proposed schemes have the following characteristics: Each scheme provides semantic security of the message, that is, after getting a valid signature, any adversary cannot determine whether his guessed message is the actual message signed by the sender by checking if it satisfies the verification equalities. If the signer repudiates her signature, the recipient can prove, without the cooperation with the signer, the dishonesty of the signer to any third party by revealing the message and its converted signature; If the recipient does not reveal the converted signature, any third party cannot check the validity of the message even though he gets the message and its corresponding signature; There are no hash functions in the proposed convertible authenticated encryption schemes.read more
Citations
More filters
Proceedings ArticleDOI
SCARS: Simplified cryptographic algorithm for RFID systems
TL;DR: This paper proposes a new symmetric key encryption approach that includes integrity as part of the encryption process for RFID systems, and does not need to employ hash functions to achieve message integrity, thus leading to computational efficiency.
Proceedings ArticleDOI
HIDE: Hybrid symmetric key algorithm for integrity check, dynamic key generation and encryption
TL;DR: This paper proposes a hybrid encryption technique that generates a key dynamically, along with integrity check parameters, using a chained approach, beginning with an initial preshared key.
Journal Article
Symmetric Encryption Algorithm for RFID Systems using a Dynamic Generation of Key
TL;DR: A hybrid encryption approach as symmetric key encryption that generate the key dynamically, together with integrity check factors is proposed that will diminish the computational complexity as well as improve performance.
Book ChapterDOI
Cryptographic Algorithm Approach for Low Cost RFID Systems
TL;DR: A lightweight symmetric key encryption approach that includes integrity as part of the encryption process in order to meet the resource limitations of low cost RFID tags and does not need to use separate hash functions to verify message integrity, thus leading to increase the computational efficiency of the system.
Dissertation
Optimized Key Management System in Cryptographic algorithms for Data Security
Rakesh Kumar,Ajay Kakkar +1 more
TL;DR: In this article, the authors present a table of contents of the paper: Table 1.iii Table of contents iv Table 2.1.2.3.4.4]
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Book ChapterDOI
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Feng Bao,Robert H. Deng +1 more
TL;DR: Zheng's scheme is modified so that the recipient's private key is no longer needed in signature verification, and the computational cost is higher than that of Zheng's scheme but lower than that that of the signature-then-encryption approach.
Journal ArticleDOI
Authenticated encryption schemes with low communication costs
TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.