An Improved Authenticated Encryption Scheme

被引:3
作者
Li, Fagen [1 ,2 ,3 ]
Deng, Jiang [1 ]
Takagi, Tsuyoshi [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Kyushu Univ, Fac Math, Fukuoka 8190395, Japan
基金
中国国家自然科学基金;
关键词
authenticated encryption; unforgeability; confidentiality; non-repudiation; MESSAGE LINKAGES; FLOWS;
D O I
10.1587/transinf.E94.D.2171
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue. In this letter, we give an improvement of the Hwang et al.'s scheme. The improved scheme not only solves the security issue of the original scheme, but also maintains its efficiency.
引用
收藏
页码:2171 / 2172
页数:2
相关论文
共 50 条
  • [41] Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function
    Kim, HakJu
    Kim, Kwangjo
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 110 - 111
  • [42] A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING LABOR-DIVISION SIGNATURE
    Tan, Zuowen
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2010, 23 (06) : 1183 - 1194
  • [43] Authenticated Encryption with Variable Stretch
    Reyhanitabar, Reza
    Vaudenay, Serge
    Vizar, Damian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 396 - 425
  • [44] Unconditionally secure authenticated encryption
    Shikata, J
    Hanaoka, G
    Zheng, YL
    Matsumoto, T
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05): : 1119 - 1131
  • [45] WAGE: An Authenticated Encryption with a Twist
    AlTawy, Riham
    Gong, Guang
    Mandal, Kalikinkar
    Rohit, Raghvendra
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 132 - 159
  • [46] On Committing Authenticated-Encryption
    Chan, John
    Rogaway, Phillip
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 275 - 294
  • [47] A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME
    Lin, Han-Yu
    Hsu, Chien-Lung
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (03) : 739 - 756
  • [48] Convertible authenticated encryption scheme without using conventional one-way function
    Chien, HY
    INFORMATICA, 2003, 14 (04) : 445 - 454
  • [49] Elliptic curve based authenticated encryption scheme and its application for electronic payment system
    Kumar, Rajeev
    Pal, S. K.
    Yadav, Arvind
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2018, 9 (01) : 90 - 101
  • [50] Compliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
    Fang, Jinyong
    Sun, Jun
    Qian, Haifeng
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (11): : 272 - 276