Convertible authenticated encryption scheme

被引:53
作者
Wu, TS
Hsu, CL
机构
[1] Huafan Univ, Dept Informat Management, Taipei 223, Hsien, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
关键词
authenticated encryption scheme; digital signature; discrete logarithms;
D O I
10.1016/S0164-1212(01)00143-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose. To protect the recipient's benefit in the case of a later dispute, we should further enable the recipient to convert the signature into an ordinary one that can be verified by anyone. Recently, Araki et al. proposed a convertible limited verifier scheme to resolve the problem. Their scheme equips the recipient with the ability to convert the signature into an ordinary one. However, the conversion requires the cooperation of the signer. In the paper, we proposed a convertible authenticated encryption scheme that can easily produce the ordinary signature without the cooperation of the signer. Further, the proposed scheme is more efficient than Araki et al.'s in terms of the computation complexities and the communication costs. (C) 2001 Elsevier Science Inc. All rights reserved.
引用
收藏
页码:205 / 209
页数:5
相关论文
共 14 条
  • [1] Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
  • [2] CAMENISCH J, 1998, ETH SERIES INFORMATI, V2
  • [3] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [4] ELGAMAL T, 1985, IEEE T INFORMATION T, V32, P468
  • [5] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [6] Cryptanalysis and improvement of Petersen-Michels signcryption scheme
    He, WH
    Wu, TC
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (02): : 123 - 124
  • [7] AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS
    HORSTER, P
    MICHELS, M
    PETERSEN, H
    [J]. ELECTRONICS LETTERS, 1994, 30 (15) : 1212 - 1213
  • [8] Mitchell C. J., 1992, CONT CRYPTOLOGY SCI
  • [9] Cryptanalysis and improvement of signcryption schemes
    Petersen, H
    Michels, M
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (02): : 149 - 151
  • [10] RIVEST RL, 1978, CACM, V21, P2