A simple authentication encryption scheme

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
Su, Chunhua [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi, Japan
[2] Osaka Univ, Grad Sch Engn, Osaka, Japan
[3] Japan Sci & Technol Agcy JST, CREST, Tokyo, Japan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2017年 / 29卷 / 16期
基金
日本科学技术振兴机构;
关键词
authentication encryption; blockcipher; compression function; IoT; nonce; PADDING ORACLE ATTACKS; INTERNET; THINGS; SECURITY; MOBILE; PROTOCOL; MODES;
D O I
10.1002/cpe.4058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An authentication encryption (AE) scheme satisfies to transfer an authenticated data between 2 parties or more. There are vast applications of the AE such as access control, encryption, enhancing trust between multiple parties, and assure the originality of a message. However, the main challenge of the AE is to maintain low-cost features for its construction. Furthermore, there is another emerging issue of Internet of Things (IoT) in the field of data and network communication. The numbers of application of the IoT are increasing expeditiously, where various kinds of device have been used such as IoT-end device, constrained device, and RfID. Moreover, the main challenge of the IoT-end devices and resource constrained devices is to keep a certain level of security bound including minimum cost. However, the IoT-end devices, resource constrained devices, and RfID have lack of resources such as memory, power, and processors. Interestingly, the AE can play a vital role between data acquisition (sensors, actuators) and data aggregation of usual platform of the IoT. Thus, the construction of the AE should satisfy the properties of low-cost, least resources, and less operating-time. Though, there are many familiar constructions of AE such as OTR, McOE, POE, OAE, APE, COPE, CLOC, and SILK but most of the schemes depend on the features of nonce and associate data. In the aspect of security, the usage of nonce and associated data are adequate. However, these 2 features increase the overhead cost. Therefore, we propose a simple construction of IV-based AE where blockcipher compression function is used as encryption function. Our proposed scheme's efficiency-rate is 1 with reasonable privacy-security bound. In addition, it can encrypt arbitrary length of message in each iteration without padding.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Study of Authentication and Encryption Scheme in EPON
    Fu Zi-yi
    Li Zong-jie
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 176 - 178
  • [2] Encryption scheme for weighted threshold authentication
    Guo, C. (guo8016@gmail.com), 1600, Press of Shanghai Scientific and Technical Publishers (30):
  • [3] Simple Matrix Scheme for Encryption
    Tao, Chengdong
    Diene, Adama
    Tang, Shaohua
    Ding, Jintai
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 231 - 242
  • [4] A Simple Authentication Scheme for Clouds
    Huszti, Andrea
    Olah, Norbert
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 565 - 569
  • [5] The Cubic Simple Matrix Encryption Scheme
    Ding, Jintai
    Petzoldt, Albrecht
    Wang, Lih-chung
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 76 - 87
  • [6] A Simple Encryption Scheme Based on WiMAX
    Luo Cuilan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1094 - 1097
  • [7] ACE (Advanced Compression Encryption) Scheme for Image Authentication
    Sangwan, Bhavna
    Bhatia, Sakshi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 225 - 232
  • [8] An optical encryption and authentication scheme using asymmetric keys
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2014, 31 (06) : 1233 - 1238
  • [9] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [10] Simple remote password authentication scheme
    Shi, Ronghua
    Hu, Xiangling
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 43 - 44