RPCAE: a novel revocable proxy convertible authenticated encryption scheme

被引:0
作者
Han-Yu Lin
机构
[1] National Taiwan Ocean University,Department of Computer Science and Engineering
来源
International Journal of Information Security | 2015年 / 14卷
关键词
Revocable; Proxy signature; Authenticated encryption; Conversion;
D O I
暂无
中图分类号
学科分类号
摘要
Convertible authenticated encryption schemes allow a signer to produce an authenticated ciphertext and only a designated recipient can verify its signature. Such schemes also provide an additional signature conversion mechanism to convince anyone of signer’s dishonesty when a later dispute occurs. Proxy signature schemes allow an authorized proxy signer to generate proxy signatures on behalf of the original signer according to the predefined signing policy. In this paper, we elaborate on the merits of both systems to propose the first novel Revocable Proxy Convertible Authenticated Encryption (RPCAE) scheme for confidential applications with proxy delegation. The revocation protocol is rather simple and incurs no extra computational efforts. Moreover, the IND-CCA2 and the EF-CMA security for the proposed scheme are also formally proved.
引用
收藏
页码:431 / 441
页数:10
相关论文
共 53 条
[1]  
Araki S(1999)The limited verifier signature and its application IEICE Trans. Fundam. E82–A 63-68
[2]  
Uehara S(2008)Selectively convertible authenticated encryption in the random oracle model Comput. J. 51 419-434
[3]  
Imamura K(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory IT–31 469-472
[4]  
Chien HY(1994)Authenticated encryption schemes with low communication costs Electron. Lett. 30 1212-1213
[5]  
ElGamal T(2011)New identity-based key-insulated convertible multi-authenticated encryption scheme J. Netw. Comput. Appl. 34 1724-1731
[6]  
Horster P(2014)Convertible authenticated encryption scheme with hierarchical access control Appl. Math. Inf. Sci. 8 1239-1246
[7]  
Michel M(2009)A new convertible authenticated encryption scheme based on the ElGamal cryptosystem Int. J. Found. Comput. Sci. 20 351-359
[8]  
Peterson H(2011)A novel identity-based key-insulated convertible authenticated encryption scheme Int. J. Found. Comput. Sci. 22 739-756
[9]  
Hsu CL(2011)Improved convertible authenticated encryption scheme with provable security Inf. Process. Lett. 111 661-666
[10]  
Lin HY(2012)An efficient strong designated verifier proxy signature scheme for electronic commerce J. Inf. Sci. Eng. 28 771-785