Self-Certified Proxy Convertible Authenticated Encryption Scheme

A proxy convertible authenticated encryption (CAE) scheme allows an original signer to delegate his signing power to a proxy signer such that the proxy signer can generate an authenticated ciphertext on behalf of the original signer. The generated authenticated ciphertext can only be decrypted and verified by the specific recipient instead of everyone else for the purpose of confidentiality. Integrating with self-certified public key systems, the proposed scheme can save more communication overheads and computation efforts, since it is not necessary to transmit and verify the public key certificate. That is, authenticating the public key can be combined with subsequent cryptographic operations such as the signature verification. In case of a later repudiation, the specific recipient has the ability to convert the signature into an ordinary one for convincing anyone of the signer's dishonesty.

[1]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[2]  Jiqiang Lu,et al.  Practical convertible authenticated encryption schemes using self-certified public keys , 2005, Appl. Math. Comput..

[3]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[5]  Fangguo Zhang,et al.  A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme , 2003, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[6]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.

[7]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[8]  Chien-Lung Hsu,et al.  Convertible authenticated encryption scheme , 2002, J. Syst. Softw..

[9]  Chin-Chen Chang,et al.  An Efficient Convertible Authenticated Encryption Scheme and Its Variant , 2003, ICICS.

[10]  S. Araki,et al.  The Limited Verifier Signature and Its Application , 1999 .

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Eiji Okamoto,et al.  Proxy signatures for delegating signing operation , 1996, CCS '96.

[13]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[14]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[15]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.