Improvement of Tseng et al.'s authenticated encryption scheme with message linkages

An authenticated encryption scheme is a message transmission scheme which sends messages in a secure and authentic way. In large message transmission, traditional authenticated encryption scheme has the disadvantage that the communication and the computation costs are too high. Recently, Tseng et al. proposed an authenticated encryption scheme with message linkages to reduce the computation time and communication costs for large message transmission. In this paper, the authors point out a weakness in Tseng et al.'s scheme. Finally, we present a new authenticated encryption scheme with message linkages to overcome the weakness in Tseng et al.'s scheme. The proposed scheme is based on the Meta-message recovery signature scheme and it is efficient in the terms of communication and computation costs.

[1]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[2]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[3]  Chin-Chen Chang,et al.  Authenticated encryption scheme without using a one way function , 1995 .

[4]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[5]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[6]  Kyung-Ah Shim,et al.  New DSA-Verifiable Signcryption Schemes , 2002, ICISC.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  David Chaum,et al.  Convertible Undeniable Signatures , 1990 .

[9]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[10]  Chin-Chen Chang,et al.  Autenticated Encryption Schemes with Message Linkage , 1996, Inf. Process. Lett..

[11]  R. A. Rueppel,et al.  Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.

[12]  Hung-Yu Chien,et al.  Authenticated encryption schemes with message linkages for message flows , 2003, Comput. Electr. Eng..

[13]  Tzong-Chen Wu,et al.  Authenticated encryption scheme with (t, n) shared verification , 1998 .

[14]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[15]  Jan Camenisch,et al.  Group signature schemes and payment systems based on the discrete logarithm problem , 1998 .

[16]  H. Petersen,et al.  Cryptanalysis and improvement of signcryption schemes , 1998 .

[17]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.