Convertible authenticated encryption scheme

Tzong Sun Wu*, Chien Lung Hsu

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

78 Scopus citations

Abstract

The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose. To protect the recipient's benefit in the case of a later dispute, we should further enable the recipient to convert the signature into an ordinary one that can be verified by anyone. Recently, Araki et al. proposed a convertible limited verifier scheme to resolve the problem. Their scheme equips the recipient with the ability to convert the signature into an ordinary one. However, the conversion requires the cooperation of the signer. In the paper, we proposed a convertible authenticated encryption scheme that can easily produce the ordinary signature without the cooperation of the signer. Further, the proposed scheme is more efficient than Araki et al.'s in terms of the computation complexities and the communication costs.

Original languageEnglish
Pages (from-to)205-209
Number of pages5
JournalJournal of Systems and Software
Volume62
Issue number3
DOIs
StatePublished - 15 06 2002
Externally publishedYes

Keywords

  • Authenticated encryption scheme
  • Digital signature
  • Discrete logarithms

Fingerprint

Dive into the research topics of 'Convertible authenticated encryption scheme'. Together they form a unique fingerprint.

Cite this