DocumentCode
524934
Title
A new authenticated encryption schemes without using Hash and Redundancy functions
Author
Li, Fangwei ; Sun, Xun ; Zhang, Xin ; Wan, Li ; Yan, Shaojun
Author_Institution
Key Lab. of Mobile Commun. Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
Volume
1
fYear
2010
fDate
30-31 May 2010
Firstpage
378
Lastpage
381
Abstract
A new type of authenticated encryption schemes combined signature with message recovery schemes and symmetric encryption schemes together. It was an authenticated encryption without using Hash functions or Redundancy functions. However, we found the scheme does not have a digital signature of the basic conditions required, and can not resist the forgery attack of the news recipient, At the same time, we proposed a new authenticated encryption schemes, the security of new scheme is based on solving the discrete logarithm problem and the dual-mode problem, and whenever a dispute arises, the authenticated encryption signature will be converted into an ordinary signature, anyone can verify the validity of signatures.
Keywords
Authentication; Communications technology; Cryptography; Digital signatures; Forgery; Mechatronics; Mobile communication; Resists; Security; Telecommunications; authenticated encryption; cryptography; public verify; signature with message recovery;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on
Conference_Location
Wuhan, China
Print_ISBN
978-1-4244-7653-4
Type
conf
DOI
10.1109/ICINDMA.2010.5538129
Filename
5538129
Link To Document