An Improved Authenticated Encryption Scheme

被引:3
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [31] A New Forward-Secure Authenticated Encryption Scheme with Message Linkages
    LI Yanping~ 1
    2. College of Mathematics and Information Science
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1537 - 1540
  • [32] Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation
    Choi, Wonseok
    Lee, Byeonghak
    Lee, Jooyoung
    Lee, Yeongmin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 : 407 - 434
  • [33] A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking
    Chen, Zhen
    Zhang, Wenfang
    Wang, Xiaomin
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 27 - 30
  • [34] Breaking the IOC Authenticated Encryption Mode
    Bottinelli, Paul
    Reyhanitabar, Reza
    Vaudenay, Serge
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 126 - 135
  • [35] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766
  • [36] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479
  • [37] Indifferentiable Authenticated Encryption
    Barbosa, Manuel
    Farshim, Pooya
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 187 - 220
  • [38] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
    Yang, Jen-Ho
    Chang, Ya-Fen
    Chen, Yi-Hui
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
  • [39] An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE ACCESS, 2019, 7 : 184207 - 184220
  • [40] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122