Convertible Multi-authenticated Encryption Scheme for Data Communication

A convertible authenticated encryption scheme allows the signer to create a valid authenticated ciphertext such that only the specified receiver can simultaneously recover and verify the message. To protect the receiver's benefit of a later dispute on repudiation, the receiver has the ability to convert the signature into an ordinary one that can be verified by anyone. However, the previous proposed convertible authenticated encryption schemes are not adequate when the signers are more than one. Based on elliptic curve cryptography, this paper will propose a new efficient convertible multi-authenticated encryption scheme for mobile communication or hardware-limited users. The proposed scheme provides the following advantages: (1) The size of the generated authenticated ciphertext is independent of the number of total signers. (2) The signature is cooperatively produced by a group of signers instead of a signal signer. (3) Except for the designated recipient, no one can derive the signed message and verify its corresponding signature. (4) When a later dispute on repudiation, the receiver has the ability to prove the dishonesty of the signers by revealing an ordinary signature that can be verified by any verifier (or judge) without the cooperation of the signers. (5) The computation costs for the verifier will not significantly increase even if the signer group is expanded. Moreover, we also proposed the convertible multi-authenticated encryption protocol in multi-verifier setting for applications.

[1]  Wei Zhao,et al.  Provably Secure Convertible Nominative Signature Scheme , 2008, Inscrypt.

[2]  Yitao Chen,et al.  Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434 , 2013 .

[3]  Yuliang Zheng,et al.  Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.

[4]  Min-Shiang Hwang,et al.  A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..

[5]  Patrick Horster,et al.  Authenticated encryption schemes with low communication costs , 1994 .

[6]  Ronald L. Rivest,et al.  Responses to NIST's proposal , 1992, CACM.

[7]  S. Araki,et al.  The Limited Verifier Signature and Its Application , 1999 .

[8]  Chin-Chen Chang,et al.  A Smart Card-based Authentication Scheme Using User Identify Cryptography , 2013, Int. J. Netw. Secur..

[9]  Jianhong Zhang,et al.  On the security of a convertible authenticated encryption , 2005, Appl. Math. Comput..

[10]  Jiqiang Lu,et al.  Practical convertible authenticated encryption schemes using self-certified public keys , 2005, Appl. Math. Comput..

[11]  Chien-Lung Hsu,et al.  Convertible authenticated encryption scheme , 2002, J. Syst. Softw..

[12]  Jia-Lun Tsai,et al.  Convertible multi-authenticated encryption scheme with one-way hash function , 2009, Comput. Commun..

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Han-Yu Lin,et al.  Convertible multi-authenticated encryption scheme , 2008, Inf. Sci..

[15]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[16]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  N. Koblitz Elliptic curve cryptosystems , 1987 .