DocumentCode
429506
Title
Efficient authenticated encryption schemes with public verifiability
Author
Wang, Guilin ; Bao, Feng ; Ma, ChangShe ; Chen, Kefei
Author_Institution
Infocomm Security Dept., Inst. for Infocomm Res., Singapore, Singapore
Volume
5
fYear
2004
fDate
26-29 Sept. 2004
Firstpage
3258
Abstract
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. C. Ma and K. Chen proposed such a scheme with public verifiability (see Electronics Letters, vol.39, no.3 p.281-2, 2003). That is, in their scheme, the receiver can efficiently prove to a third party that a message has indeed originated from a specific sender. We first identify two security weaknesses in the Ma-Chen authenticated encryption scheme. Then, based on the Schnorr signature, we proposed an efficient and secure improved scheme such that all the desired security requirements are satisfied.
Keywords
digital signatures; public key cryptography; telecommunication security; Schnorr signature; authenticated encryption schemes; digital signature; information security; public key; public verifiability; security weaknesses; Authentication; Certification; Computer science; Computer security; Data security; Digital signatures; Information security; Protocols; Public key; Public key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th
ISSN
1090-3038
Print_ISBN
0-7803-8521-7
Type
conf
DOI
10.1109/VETECF.2004.1404665
Filename
1404665
Link To Document