Threshold convertible authenticated encryption scheme for hierarchical organizations

Chien Lung Hsu, Yu Li Lin*, Tzong Chen Wu, Chain Hui Su

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature that can be verified by anyone. In this paper, we elaborate on the merits of CAE and secret sharing schemes to propose two new (t,n) threshold authenticated encryption schemes for hierarchical structures. Our proposed schemes not only allow i-th level participants to support the (i+1)-th level participants to generate the authenticated encryption messages, but also allow the participants of i-th or higher levels to cooperatively generate the valid ones. Any authenticated ciphertext for a message is addressed to a specified group of signers in such a way that the ability to generate the ciphertext is regulated by the adopted (t,n) threshold schemes. Furthermore, the proposed schemes achieve the security requirements of an authenticated encryption scheme.

Original languageEnglish
Title of host publicationCommunication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Proceedings
Pages23-36
Number of pages14
EditionPART 1
DOIs
StatePublished - 2010
Externally publishedYes
EventInternational Conference on Communication and Networking, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010 - Jeju Island, Korea, Republic of
Duration: 13 12 201015 12 2010

Publication series

NameCommunications in Computer and Information Science
NumberPART 1
Volume119 CCIS
ISSN (Print)1865-0929

Conference

ConferenceInternational Conference on Communication and Networking, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010
Country/TerritoryKorea, Republic of
CityJeju Island
Period13/12/1015/12/10

Keywords

  • authenticated encryption scheme
  • group-oriented
  • hierarchical
  • message recovery

Fingerprint

Dive into the research topics of 'Threshold convertible authenticated encryption scheme for hierarchical organizations'. Together they form a unique fingerprint.

Cite this