Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem

被引:4
作者
Tahat, Nedal [1 ]
机构
[1] Hashemite Univ, Fac Sci, Dept Math, PO 150459, Zarqa 13115, Jordan
关键词
multi-authenticated encryption; elliptic curve discrete logarithm problem; chosen plain-text attacks; encryption;
D O I
10.1504/IJCAT.2016.10000490
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The work presents a Convertible Multi-Authenticated Encryption (CMAE) scheme based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed scheme intended to develop the CMAE scheme to improve performance as compared to the other existing schemes. Most CMAE schemes are very high in computational overhead and memory usage problem. This scheme desired to reduce time-consuming problem by using Elliptic Curve Cryptography (ECC). In addition, the proposed scheme provides good resistance to the chosen plain-text attacks and is proven to be secure. As for efficiency, the computation cost of the proposed scheme is smaller than the existing schemes, such as Lu et al.'s scheme.
引用
收藏
页码:229 / 235
页数:7
相关论文
共 16 条
[1]  
Araki S., 1998, P 1998 S CRYPT INF S, P32
[2]  
Chien HY, 2003, INFORMATICA-LITHUAN, V14, P445
[3]  
Chung-Fu Lu, 2014, International Journal of Future Computer and Communication, V3, P315, DOI 10.7763/IJFCC.2014.V3.318
[4]  
Contini S, 2006, LECT NOTES COMPUT SC, V4004, P165
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[7]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[8]   Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET [J].
Melaku, Henock M. ;
Woldegebreal, Dereje H. ;
Raimond, Kumudha .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2015, 51 (03) :235-246
[9]   Design of high-performance low-power full adder [J].
Nehru, K. ;
Shanmugam, A. .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2014, 49 (02) :134-140
[10]   Extensions to ciphertext-policy attribute-based encryption to support distributed environments [J].
Servos, Daniel ;
Mohammed, Sabah ;
Fiaidhi, Jinan ;
Kim, Tai Hoon .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2013, 47 (2-3) :215-226