Efficient convertible authenticated encryption schemes for smart card applications in network environments

  • Chien Lung Hsu*
  • , Tzong Sun Wu
  • , Han Yu Lin
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Authenticated encryption schemes allow the signer to produce an encrypted message such that only the designated recipient can recover the message and validate its signature in network environments. To avoid a later dispute on the repudiation of the signature, we should equip the recipient with the ability for converting the signature into an ordinary one which can be verified by anyone. The scheme with the above capability is called a convertible authenticated encryption (CAE) scheme. Achieving not only the requirements of integrity, authenticity and non-repudiation but also confidentiality, a CAE scheme is suitable for some practical environments such as the transmission of credit card information or the delivery of confidential documents. In the paper, we first give variants of Wu and Hsu's CAE scheme based on the discrete logarithms. Then, for facilitating the device with limited computing power and insufficient storage space like smart cards, we modify the schemes based on the elliptic curve discrete logarithms.

Original languageEnglish
Title of host publicationWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Pages13-18
Number of pages6
StatePublished - 2005
Externally publishedYes
Event9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005 - Orlando, FL, United States
Duration: 10 07 200513 07 2005

Publication series

NameWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Volume5

Conference

Conference9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005
Country/TerritoryUnited States
CityOrlando, FL
Period10/07/0513/07/05

Keywords

  • Authenticated encryption
  • Convertible
  • Discrete logarithm
  • Smart cards

Fingerprint

Dive into the research topics of 'Efficient convertible authenticated encryption schemes for smart card applications in network environments'. Together they form a unique fingerprint.

Cite this