Provably secure proxy convertible authenticated encryption scheme based on RSA

被引:6
作者
Wu, Tzong-Sun [1 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
Proxy signature; Authenticated encryption; Digital signature; Conversion; SIGNATURE SCHEME; DELEGATION; PROTOCOL;
D O I
10.1016/j.ins.2014.03.075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To engage with complicated business operations, we propose a proxy convertible authenticated encryption (CAE) scheme based on RSA assumption to resolve the delegation problem for confidential transactions. The proposed scheme enables an authorized proxy signer to produce a proxy authenticated ciphertext such that only the designated recipient can validate it for assuring the transaction privacy. In case of a later repudiation, the designated recipient can just release the converted proxy signature for public arbitration without extra computation efforts or communication overheads. Moreover, the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are given in the random oracle model. To the best of our knowledge, the proposed scheme is the first provably secure proxy CAE scheme based on RSA assumption. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:577 / 587
页数:11
相关论文
共 37 条
[1]  
Araki S, 1999, IEICE T FUND ELECTR, VE82A, P63
[2]   A secure identity-based proxy multi-signature scheme [J].
Cao, Feng ;
Cao, Zhenfu .
INFORMATION SCIENCES, 2009, 179 (03) :292-302
[3]   A Convertible Multi Authenticated Encryption scheme for group communications [J].
Chang, Ting-Yi .
INFORMATION SCIENCES, 2008, 178 (17) :3426-3434
[4]   Selectively convertible authenticated encryption in the random oracle model [J].
Chien, Hung-Yu .
COMPUTER JOURNAL, 2008, 51 (04) :419-434
[5]  
Hendry M., 1997, Smart card security and applications
[6]   Efficient threshold proxy signature protocol for mobile agents [J].
Hong, Xuan .
INFORMATION SCIENCES, 2009, 179 (24) :4243-4248
[7]   AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J].
HORSTER, P ;
MICHELS, M ;
PETERSEN, H .
ELECTRONICS LETTERS, 1994, 30 (15) :1212-1213
[8]  
Hsu CL, 2005, WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5, P13
[9]   New nonrepudiable threshold proxy signature scheme with known signers [J].
Hsu, CL ;
Wu, TS ;
Wu, TC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) :119-124
[10]   A novel proxy key generation protocol and its application [J].
Hu, Xiaoming ;
Huang, Shangteng .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :191-195