A secure authenticated encryption scheme and its extension

被引:0
|
作者
Zhang, Jianhong [1 ]
Cheng, Ji [1 ]
机构
[1] N China Univ Technol, Inst Image Proc & Pattern Recogint, Beijing, Peoples R China
来源
PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS | 2007年
关键词
digital signature; random oracle; authentication encryption scheme; security proof; message recovery;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a message. In the large message transmission, traditional authenticated encryption schemes have the disadvantage that communication overheads and the computation costs are too high. In this work, we propose a secure authentication encryption scheme and show that the scheme is secure in the random oracle model. Comparisons of our proposed scheme with Wu-Hsus scheme and Huang-Changs scheme, the proposed scheme is more efficient for computation complexity and communication cost. Finally, we extend our proposed scheme to adapt to the authenticated encryption for a large message, which is secure against the message block being reordered, replicated or partially deleted during transmission.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [31] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
  • [32] Authenticated encryption scheme with (t,n) shared verification and its security
    Lu, J.Z.
    Chen, H.Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (09):
  • [33] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks
    Ashrif, Fatma Foad
    Sundarajan, Elankovan A.
    Ahmed, Rami
    Hasan, Mohammad Kamrul
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, SENSORNETS 2023, 2023, : 67 - 78
  • [34] Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
    Xie, Qi
    Wang, Guilin
    Xia, Fubiao
    Chen, Deren
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1038 - 1051
  • [35] An authenticated secure image hiding scheme
    Lee, W-B
    Li, J-H
    Chen, S-C
    Chen, T-H
    IMAGING SCIENCE JOURNAL, 2009, 57 (02): : 109 - 117
  • [36] Secure implementation of authenticated encryption in SROS2 for embedded systems and its evaluation
    Takemoto S.
    Nishida K.
    Nozaki Y.
    Honda S.
    Kurachi R.
    Yoshikawa M.
    IEEJ Transactions on Electronics, Information and Systems, 2020, 140 (08) : 939 - 948
  • [37] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
    Yang, Jen-Ho
    Chang, Ya-Fen
    Chen, Yi-Hui
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
  • [38] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [39] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [40] QCB: Efficient Quantum-Secure Authenticated Encryption
    Bhaumik, Ritam
    Bonnetain, Xavier
    Chailloux, Andre
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698