Abstract
An authenticated encryption scheme is a message recovery scheme that provides the authenticity property. In an authenticated encryption scheme, the recipients not only verify the message authentication, but they also could recover the message. In this paper, we propose a new authenticated encryption scheme based on two hard number theoretical problems: factoring and discrete logarithm. In our new scheme, t out of n signers/senders are required to sign and at the same time encrypt a message, while k out of l recipients cooperate to verify and recover the original message. We also show that our scheme is secure against some cryptographic attacks and requires reasonable number of operations in both signature/encryption and verification/decryption phases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)
Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)
Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998)
Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988)
Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992)
Shamir, A.: How to share a secret. Commun. ACM, 22(11), 612–613 (1979)
Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000)
Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)
Acknowledgments
The first author acknowledges the financial support received from Universiti Utara Malaysia under the LEADS grant code 12030.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Singapore
About this paper
Cite this paper
Mohamad, M., Ismail, E., Ibrahim, H. (2014). A New Threshold-Authenticated Encryption Scheme. In: Kilicman, A., Leong, W., Eshkuvatov, Z. (eds) International Conference on Mathematical Sciences and Statistics 2013. Springer, Singapore. https://doi.org/10.1007/978-981-4585-33-0_25
Download citation
DOI: https://doi.org/10.1007/978-981-4585-33-0_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-4585-32-3
Online ISBN: 978-981-4585-33-0
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)