Skip to main content

A New Threshold-Authenticated Encryption Scheme

  • Conference paper
  • First Online:
International Conference on Mathematical Sciences and Statistics 2013

Abstract

An authenticated encryption scheme is a message recovery scheme that provides the authenticity property. In an authenticated encryption scheme, the recipients not only verify the message authentication, but they also could recover the message. In this paper, we propose a new authenticated encryption scheme based on two hard number theoretical problems: factoring and discrete logarithm. In our new scheme, t out of n signers/senders are required to sign and at the same time encrypt a message, while k out of l recipients cooperate to verify and recover the original message. We also show that our scheme is secure against some cryptographic attacks and requires reasonable number of operations in both signature/encryption and verification/decryption phases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, T.S., Kuang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystem. Comp. Stand. Inter., 26, 461–469 (2004)

    Article  Google Scholar 

  2. Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Denning, D., Pyle, R., Ganesan, R., Sandhu, R., & Ashby, V. (eds.) Proceedings of the First ACM Conference on Computer and Communications Security, pp. 58–61. ACM Press, New York (1993)

    Chapter  Google Scholar 

  3. Hsu, C.L., Wu, T.C.: Authenticated encryption scheme with (t, n) shared verification. IEE Proc.-E, 145(2), 117–120 (1998)

    Google Scholar 

  4. Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) Advances in Cryptology, Proceedings of Crypto ’87. Lecture Notes in Computer Science, vol. 293, pp. 120–127. Springer, Heidelberg (1988)

    Google Scholar 

  5. Desmedt, Y., Frankel, Y.: Shared generation of authenticators. In: Feigenbaum, J. (ed.) Advances in Cryptology, Proceedings of Crypto ’91. Lecture Notes in Computer Science, vol. 576, pp. 457–469. Springer, Heidelberg (1992)

    Google Scholar 

  6. Shamir, A.: How to share a secret. Commun. ACM, 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  7. Wang, C.T., Chang, C.C., Lin, C.H.: Generalization of threshold signature and authenticated encryption for group communications. IEICE T. Fund. Electr., E83-A(6), 1228–1237 (2000)

    Google Scholar 

  8. Hsu, C.L., Wu, T.S., Wu, T.C.: Improvements of generalization of threshold signature and authenticated encryption for group communications. Inform. Process. Lett., 81, 41–45 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  9. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystem. Commun. ACM, 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  10. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE T. Inform. Theory, 31(4), 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgments

The first author acknowledges the financial support received from Universiti Utara Malaysia under the LEADS grant code 12030.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohd Saiful Adli Mohamad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Singapore

About this paper

Cite this paper

Mohamad, M., Ismail, E., Ibrahim, H. (2014). A New Threshold-Authenticated Encryption Scheme. In: Kilicman, A., Leong, W., Eshkuvatov, Z. (eds) International Conference on Mathematical Sciences and Statistics 2013. Springer, Singapore. https://doi.org/10.1007/978-981-4585-33-0_25

Download citation

Publish with us

Policies and ethics