AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY

被引:0
作者
Chen, Tzung-Her [1 ]
Li, Ct-Lin [1 ]
机构
[1] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 60004, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2011年 / 7卷 / 11期
关键词
Digital signature; Authenticated encryption; Convertible; Labor-division; DIGITAL SIGNATURE; LINKAGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Chung et al. (2009) proposed a novel and valuable threshold authenticated encryption scheme. Unfortunately, it has a potential weakness: if the secret message involves criminal evidence or illegal content, the designated receiver cannot authenticate the secret message in the later dispute. The authors of this paper aim at enhancing Chung et al.'s scheme by adding the convertibility capability so that the designated receiver can demonstrate that the signature with respect to the message has been signed. And then, the enforcement agency can trace the source of secret messages. In addition to inheriting the advantages of Chung et al.'s scheme, the improved scheme achieves the goal that the designated recipient can convert an authenticated signature into an ordinary signature. It is worthwhile to note that the main advantages are that, with the ordinary signature along with the signed message, the third party can verify if the authenticated signature was generated by a specific signer group. In this way, public verifiability to the authenticated encryption scheme is satisfied.
引用
收藏
页码:6177 / 6185
页数:9
相关论文
共 13 条
[1]  
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]   Threshold authenticated encryption scheme using labor-division signature [J].
Chung, Yu Fang ;
Huang, Kuo Hsuan ;
Chen, Tzer Shyong .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :300-304
[3]  
Chung YF, 2009, INT J INNOV COMPUT I, V5, P2829
[4]  
HARN L, 1994, IEEE P COMPUTERS DIG, V141, P303
[5]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[6]  
Hwang M.-S., 2009, ICIC EXPRESS LETT, V3, P259
[7]   Authenticated encryption schemes with message linkage [J].
Hwang, SJ ;
Chang, CC ;
Yang, WP .
INFORMATION PROCESSING LETTERS, 1996, 58 (04) :189-194
[8]   Authenticated encryption schemes with linkage between message blocks [J].
Lee, WB ;
Chang, CC .
INFORMATION PROCESSING LETTERS, 1997, 63 (05) :247-250
[9]  
Lee WB, 1999, J INF SCI ENG, V15, P669
[10]  
Park C, 1996, IEICE T FUND ELECTR, VE79A, P86