On the security of two authenticated encryption schemes

被引:0
作者
Zhang, Jianhong [1 ]
Ji, Cheng [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
来源
PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2 | 2008年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An authenticated encryption scheme is a message transmission, which sends messages in secure and authentic way. It is very suitable to mobile device. Recently, C.S.Ma and K.F.Chen give a new authenticated encryption scheme, and Hung-Yu Chien also give a convertible authenticated encryption scheme. However, our analysis shows that the two schemes are extremely insecure. The common flaw of the two schemes is forgeability and repudiation. After we give the corresponding attack to the two authenticated encryption schemes respectively, we propose two secure publicly verifiable authenticated encryption schemes to overcome the flaws of MC scheme and Hung-Yu Chien Scheme. As for efficiency, the computation cost and communication overhead of our proposed schemes are as small as the two original schemes: the MC scheme and the Hung-Yu Chien scheme. Finally, we give secure proof to the proposed schemes.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 12 条
[1]  
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]   Investigation into products of dimethyl dithiocarbamate and xanthate sorption on sulfide minerals of copper-nickel ores [J].
Chanturiya, VA ;
Matveeva, TN ;
Lantsova, LB .
JOURNAL OF MINING SCIENCE, 2003, 39 (03) :281-286
[3]  
CHIEN HY, 2003, INFORMATICA 2003, P1
[4]  
GEISELMANN W, 2004, KEY SUBSTITUTION ATT
[5]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[6]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[7]   AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION [J].
LEE, WB ;
CHANG, CC .
ELECTRONICS LETTERS, 1995, 31 (19) :1656-1657
[8]  
Mitsunari S, 2002, IEICE T FUND ELECTR, VE85A, P481
[9]  
Pointcheval D, 1996, LECT NOTES COMPUT SC, V1070, P387
[10]  
WU TS, 2002, IEE P COMPUTER DIGIT, V145, P15