scispace - formally typeset
Search or ask a question
Topic

Authenticated encryption

About: Authenticated encryption is a research topic. Over the lifetime, 1328 publications have been published within this topic receiving 25968 citations. The topic is also known as: AEAD & Authenticated Encryption with Associated Data.


Papers
More filters
Journal ArticleDOI
TL;DR: An improved signcrypted scheme with public verifiability is presented, in the scheme signcryption message is generated with private key of message sender and other public parameters, any trustable third party can verify the signc encryption without disclosing private key or secret parameters.
Abstract: Public verifiability in signcryption achieves public verification of signature by a trustable third party; it ensures the reliability and secure parity of signcryption scheme. In the paper, we analyzed the public verification algorithm in signcryption and presented signcryption scheme without verifiability based on discrete logarithm problem as a comparison. Signcryption without verifiability satisfies the basic requirements of authenticated encryption; it can achieve secret message transmission and identity authentication in a single protocol. But the signcryption sender can cheat in the protocol with forged information for lack of supervision by public verification. Then we presented an improved signcryption scheme with public verifiability, in the scheme signcryption message is generated with private key of message sender and other public parameters, any trustable third party can verify the signcryption without disclosing private key or secret parameters. Besides, the attack on the signcryption and secret parameters via public verification data is computationally infeasible. The scheme reinforces the security and reliability of signcryption and effectively improves its efficiency for engineering application.

2 citations

Journal ArticleDOI
TL;DR: The security of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive choosing-message attacks (EF-CMA) are proved in the random oracle model.
Abstract: This paper presents a novel proxy convertible multi-authenticated encryption (multi-AE) scheme and its variant with message linkages. The proposed scheme allows two or more original signers to cooperatively delegate their signing power to an authorized proxy signer, such that the proxy signer can generate a valid authenticated ciphertext on behalf of the original signing group and only the designated recipient is capable of decrypting the ciphertext and verifying its embedded proxy multi-signature. Its variant with message linkages further benefits the encryption of a large message by dividing it into many smaller message blocks. The proposed proxy convertible multi-AE scheme and its variant can simultaneously fulfill the security requirements of confidentiality and authenticity. Thus, they are applicable to those group-oriented confidential applications with proxy delegation, e.g., proxy on-line auction, proxy contract signing and so on. In case of a later dispute over repudiation, our proposed scheme also allows the designated recipient to convert the ciphertext into an original proxy multi-signature for public verification. In addition, the security of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are proved in the random oracle model.DOI: http://dx.doi.org/10.5755/j01.itc.46.4.15819

2 citations

Journal ArticleDOI
06 Jan 2021-PLOS ONE
TL;DR: In this paper, the authors proposed a heterogeneous deniable authenticated encryption (HDAE) scheme for location-based services, which permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment.
Abstract: The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user's location privacy is a major concern. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE for location-based services. The proposed scheme permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment. Our design utilizes a hybrid encryption method combing the tag-key encapsulation mechanism (tag-KEM) and the data encapsulation mechanism (DEM), which is well adopted for location-based services applications. We give how to design an HDAE scheme utilizing a heterogeneous deniable authenticated tag-KEM (HDATK) and a DEM. We also construct an HDATK scheme and provide security proof in the random oracle model. Comprehensive analysis shows that our scheme is efficient and secure. In addition, we give an application of the HDAE to a location-based services system.

2 citations

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the effect of the method used to construct an authenticated encryption scheme on the performance of the construction and showed that the proposed construction is even more secure than standard authentication based on universal hashing in the sense that the hashing key is resilient to key recovery attacks.
Abstract: In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing solely on the “security” implications of the different methods for constructing authenticated encryption schemes, we investigate the effect of the method used to construct an authenticated encryption scheme on the “performance” of the construction. We show that, as opposed to the current NIST standard, by performing the authentication operation before the encryption operation, the computational efficiency of the construction can be increased, without affecting the security of the overall construction. In fact, we show that the proposed construction is even more secure than standard authentication based on universal hashing in the sense that the hashing key is resilient to key recovery attacks.

2 citations


Network Information
Related Topics (5)
Public-key cryptography
27.2K papers, 547.7K citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Encryption
98.3K papers, 1.4M citations
86% related
Hash function
31.5K papers, 538.5K citations
84% related
Authentication
74.7K papers, 867.1K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202319
202252
202167
2020109
2019111
201897