A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking

被引:1
作者
Chen, Zhen [1 ,2 ]
Zhang, Wenfang [1 ,2 ]
Wang, Xiaomin [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu, Peoples R China
[2] Southwest Jiaotong Univ, Key Lab Informat Secur & Natl Comp Grid, Chengdu, Peoples R China
来源
2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC) | 2014年
关键词
Authenticated encryption; Threshold signature; Elliptic curve cryptography; Message linkage;
D O I
10.1109/CyberC.2014.12
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel robust collaborative threshold authenticated encryption scheme is proposed in this paper. Based on the elliptic curve cryptography and the message linkage technology, this scheme can realize efficient encryption and authentication of large messages. Analysis shows that the proposed scheme is theoretically correct and has better performance. The scheme can be further applied into distributed environments, such as cloud storage and computing networks, dynamic alliance of enterprises and virtual organizations.
引用
收藏
页码:10 / 13
页数:4
相关论文
共 10 条
[1]   Threshold authenticated encryption scheme using labor-division signature [J].
Chung, Yu Fang ;
Huang, Kuo Hsuan ;
Chen, Tzer Shyong .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :300-304
[2]  
Horster P., 1985, IEE ELECT LETT, V30, P1212
[3]   Authenticated encryption scheme with (t, n) shared verification [J].
Hsu, CL ;
Wu, TC .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02) :117-120
[4]   RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings [J].
Juang, Wen-Shenq .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (04) :638-645
[5]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[6]   Cryptanalysis of Nyberg-Rueppel's message recovery scheme [J].
Lin, CC ;
Laih, CS .
IEEE COMMUNICATIONS LETTERS, 2000, 4 (07) :231-232
[7]  
Nyberg K., 1993, PROC ACM C COMPUTER, P58
[8]   A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING LABOR-DIVISION SIGNATURE [J].
Tan, Zuowen .
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2010, 23 (06) :1183-1194
[9]   Method of constructing elliptic curve authenticated encryption scheme [J].
Zhao, ZM ;
Liu, FY .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) :146-151
[10]   Improvement on a threshold authenticated encryption scheme [J].
Tan Z. .
Journal of Software, 2010, 5 (07) :697-704