• DocumentCode
    524934
  • Title

    A new authenticated encryption schemes without using Hash and Redundancy functions

  • Author

    Li, Fangwei ; Sun, Xun ; Zhang, Xin ; Wan, Li ; Yan, Shaojun

  • Author_Institution
    Key Lab. of Mobile Commun. Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
  • Volume
    1
  • fYear
    2010
  • fDate
    30-31 May 2010
  • Firstpage
    378
  • Lastpage
    381
  • Abstract
    A new type of authenticated encryption schemes combined signature with message recovery schemes and symmetric encryption schemes together. It was an authenticated encryption without using Hash functions or Redundancy functions. However, we found the scheme does not have a digital signature of the basic conditions required, and can not resist the forgery attack of the news recipient, At the same time, we proposed a new authenticated encryption schemes, the security of new scheme is based on solving the discrete logarithm problem and the dual-mode problem, and whenever a dispute arises, the authenticated encryption signature will be converted into an ordinary signature, anyone can verify the validity of signatures.
  • Keywords
    Authentication; Communications technology; Cryptography; Digital signatures; Forgery; Mechatronics; Mobile communication; Resists; Security; Telecommunications; authenticated encryption; cryptography; public verify; signature with message recovery;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Industrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on
  • Conference_Location
    Wuhan, China
  • Print_ISBN
    978-1-4244-7653-4
  • Type

    conf

  • DOI
    10.1109/ICINDMA.2010.5538129
  • Filename
    5538129