DocumentCode :
524934
Title :
A new authenticated encryption schemes without using Hash and Redundancy functions
Author :
Li, Fangwei ; Sun, Xun ; Zhang, Xin ; Wan, Li ; Yan, Shaojun
Author_Institution :
Key Lab. of Mobile Commun. Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
Volume :
1
fYear :
2010
fDate :
30-31 May 2010
Firstpage :
378
Lastpage :
381
Abstract :
A new type of authenticated encryption schemes combined signature with message recovery schemes and symmetric encryption schemes together. It was an authenticated encryption without using Hash functions or Redundancy functions. However, we found the scheme does not have a digital signature of the basic conditions required, and can not resist the forgery attack of the news recipient, At the same time, we proposed a new authenticated encryption schemes, the security of new scheme is based on solving the discrete logarithm problem and the dual-mode problem, and whenever a dispute arises, the authenticated encryption signature will be converted into an ordinary signature, anyone can verify the validity of signatures.
Keywords :
Authentication; Communications technology; Cryptography; Digital signatures; Forgery; Mechatronics; Mobile communication; Resists; Security; Telecommunications; authenticated encryption; cryptography; public verify; signature with message recovery;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on
Conference_Location :
Wuhan, China
Print_ISBN :
978-1-4244-7653-4
Type :
conf
DOI :
10.1109/ICINDMA.2010.5538129
Filename :
5538129
Link To Document :
بازگشت