A simple authentication encryption scheme

被引:3
|
作者
Mazumder, Rashed [1 ]
Miyaji, Atsuko [1 ,2 ,3 ]
Su, Chunhua [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Sch Informat Sci, Nomi, Japan
[2] Osaka Univ, Grad Sch Engn, Osaka, Japan
[3] Japan Sci & Technol Agcy JST, CREST, Tokyo, Japan
来源
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE | 2017年 / 29卷 / 16期
基金
日本科学技术振兴机构;
关键词
authentication encryption; blockcipher; compression function; IoT; nonce; PADDING ORACLE ATTACKS; INTERNET; THINGS; SECURITY; MOBILE; PROTOCOL; MODES;
D O I
10.1002/cpe.4058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An authentication encryption (AE) scheme satisfies to transfer an authenticated data between 2 parties or more. There are vast applications of the AE such as access control, encryption, enhancing trust between multiple parties, and assure the originality of a message. However, the main challenge of the AE is to maintain low-cost features for its construction. Furthermore, there is another emerging issue of Internet of Things (IoT) in the field of data and network communication. The numbers of application of the IoT are increasing expeditiously, where various kinds of device have been used such as IoT-end device, constrained device, and RfID. Moreover, the main challenge of the IoT-end devices and resource constrained devices is to keep a certain level of security bound including minimum cost. However, the IoT-end devices, resource constrained devices, and RfID have lack of resources such as memory, power, and processors. Interestingly, the AE can play a vital role between data acquisition (sensors, actuators) and data aggregation of usual platform of the IoT. Thus, the construction of the AE should satisfy the properties of low-cost, least resources, and less operating-time. Though, there are many familiar constructions of AE such as OTR, McOE, POE, OAE, APE, COPE, CLOC, and SILK but most of the schemes depend on the features of nonce and associate data. In the aspect of security, the usage of nonce and associated data are adequate. However, these 2 features increase the overhead cost. Therefore, we propose a simple construction of IV-based AE where blockcipher compression function is used as encryption function. Our proposed scheme's efficiency-rate is 1 with reasonable privacy-security bound. In addition, it can encrypt arbitrary length of message in each iteration without padding.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Fast encryption and authentication: XCBC encryption and XECB authentication modes
    Gligor, VD
    Donescu, P
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 92 - 108
  • [42] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [43] A Lightweight Combined Physical Layer Encryption and Authentication Scheme for Industrial Internet of Things
    Wang, Junjie
    Han, Gangtao
    Li, Shuangzhi
    Zhou, Fasheng
    Wang, Ning
    IEEE ACCESS, 2024, 12 : 6961 - 6970
  • [44] Insurance Block: A Blockchain Credit Transaction Authentication Scheme Based on Homomorphic Encryption
    Xiao, Lijun
    Deng, Han
    Tan, Minfu
    Xiao, Weidong
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 747 - 751
  • [45] Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication
    Jin, Liang
    Hu, Xiaoyan
    Sun, Xiaoli
    Lou, Yangming
    Huang, Kaizhi
    Zhong, Zhou
    Xu, Xiaoming
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [46] An Encryption-Authentication Unified AID Conversion Scheme for IoT Sensor Nodes
    Gadde, Vinod. V.
    Awano, Hliromitsu
    Ikeda, Makoto
    2018 IEEE ASIAN SOLID-STATE CIRCUITS CONFERENCE (A-SSCC): PROCEEDINGS OF TECHNICAL PAPERS, 2018, : 123 - 126
  • [47] A Low Overhead and Scalable Authentication and Encryption Scheme for Medical Wireless Sensor Networks
    Vohra, Harpreet
    Hasan, Mohammad Kamrul
    Shukla, Harsh
    Muniyandi, Ravie Chandren
    Alhumyani, Hesham
    Alzaidi, Mohammed S.
    Manna, Manpreet S.
    Islam, Shayla
    Habib, A. K. M. Ahasan
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [48] THREE-FACTOR AUTHENTICATION SCHEME BASED ON SEARCHABLE ENCRYPTION AND BIOMETRIC FINGERPRINT
    Mihailescu, Marius Iulian
    Nita, Stefania Loredana
    2020 13TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2020, : 139 - 144
  • [49] Encryption scheme with mixed homomorphic signature based on message authentication for digital image
    Yang, Jing
    Fan, Mingyu
    Wang, Guangwei
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1201 - 1211
  • [50] Structural Key Recovery of Simple Matrix Encryption Scheme Family
    Liu, Jinhui
    Yu, Yong
    Yang, Bo
    Jia, Jianwei
    Wang, Shijia
    Wang, Houzhen
    COMPUTER JOURNAL, 2018, 61 (12): : 1880 - 1896