scispace - formally typeset
Proceedings ArticleDOI

Novel convertible authenticated encryption schemes without using hash functions

Xuhong Li, +3 more
- Vol. 1, pp 504-508
Reads0
Chats0
TLDR
Based on the public discrete logarithm hard problem solely, this paper proposes a novel convertible authenticated encryption scheme without using hash functions, and extends it to a (t, n) threshold scheme.
Abstract
An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while keeping the message secret from the public, and a convertible authenticated encryption scheme enables the recipient to convert the signature to an ordinary one so that any third party can verify its validity. The paper shows a weaknesses in Chien's [3] convertible authenticated encryption scheme, then based on the public discrete logarithm hard problem solely, we propose a novel convertible authenticated encryption scheme without using hash functions, and extend it to a (t, n) threshold scheme. The proposed schemes have the following characteristics: Each scheme provides semantic security of the message, that is, after getting a valid signature, any adversary cannot determine whether his guessed message is the actual message signed by the sender by checking if it satisfies the verification equalities. If the signer repudiates her signature, the recipient can prove, without the cooperation with the signer, the dishonesty of the signer to any third party by revealing the message and its converted signature; If the recipient does not reveal the converted signature, any third party cannot check the validity of the message even though he gets the message and its corresponding signature; There are no hash functions in the proposed convertible authenticated encryption schemes.

read more

Citations
More filters
Proceedings ArticleDOI

SCARS: Simplified cryptographic algorithm for RFID systems

TL;DR: This paper proposes a new symmetric key encryption approach that includes integrity as part of the encryption process for RFID systems, and does not need to employ hash functions to achieve message integrity, thus leading to computational efficiency.
Proceedings ArticleDOI

HIDE: Hybrid symmetric key algorithm for integrity check, dynamic key generation and encryption

TL;DR: This paper proposes a hybrid encryption technique that generates a key dynamically, along with integrity check parameters, using a chained approach, beginning with an initial preshared key.
Journal Article

Symmetric Encryption Algorithm for RFID Systems using a Dynamic Generation of Key

TL;DR: A hybrid encryption approach as symmetric key encryption that generate the key dynamically, together with integrity check factors is proposed that will diminish the computational complexity as well as improve performance.
Book ChapterDOI

Cryptographic Algorithm Approach for Low Cost RFID Systems

TL;DR: A lightweight symmetric key encryption approach that includes integrity as part of the encryption process in order to meet the resource limitations of low cost RFID tags and does not need to use separate hash functions to verify message integrity, thus leading to increase the computational efficiency of the system.
Dissertation

Optimized Key Management System in Cryptographic algorithms for Data Security

Rakesh Kumar, +1 more
TL;DR: In this article, the authors present a table of contents of the paper: Table 1.iii Table of contents iv Table 2.1.2.3.4.4]
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Book ChapterDOI

A Signcryption Scheme with Signature Directly Verifiable by Public Key

TL;DR: Zheng's scheme is modified so that the recipient's private key is no longer needed in signature verification, and the computational cost is higher than that of Zheng's scheme but lower than that that of the signature-then-encryption approach.
Journal ArticleDOI

Authenticated encryption schemes with low communication costs

TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.