• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System

Vol. 8, No. 3, March 30, 2014
10.3837/tiis.2014.03.026, Download Paper (Free):

Abstract

Convertible authenticated encryption (CAE) schemes enable the signer to send a confidential message and its corresponding signature to the designated recipient. The recipient can also convert the signature into a conventional one which can be verified by anyone. Integrating the properties of self-certified public key systems, this paper presents efficient and computationally indistinguishable self-certified CAE schemes for strengthening the security of E-Commerce applications. Additionally, we also adapt the proposed schemes to elliptic curve systems for facilitating the applications of limited computing power and insufficient storage space. The proposed schemes are secure against known existential active attacks, satisfy the semantic security requirement, and have the following advantages: (i) No extra certificate is required since the tasks of authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing computation efforts and communication overheads. (ii) In case of a later dispute, the recipient can convert the signature into an ordinary one for the public arbitration. (iii) The signature conversion can be solely performed by the recipient without additional computation efforts or communication overheads. (iv) The recipient of the signature can prove himself, if needed, to anyone that he is actually the designated recipient.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
T. Wu, Y. Chen, H. Lin, "Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System," KSII Transactions on Internet and Information Systems, vol. 8, no. 3, pp. 1157-1177, 2014. DOI: 10.3837/tiis.2014.03.026.

[ACM Style]
Tzong-Sun Wu, Yih-Sen Chen, and Han-Yu Lin. 2014. Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System. KSII Transactions on Internet and Information Systems, 8, 3, (2014), 1157-1177. DOI: 10.3837/tiis.2014.03.026.

[BibTeX Style]
@article{tiis:20493, title="Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System", author="Tzong-Sun Wu and Yih-Sen Chen and Han-Yu Lin and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2014.03.026}, volume={8}, number={3}, year="2014", month={March}, pages={1157-1177}}