Cl. Hsu et Tc. Wu, AUTHENTICATED ENCRYPTION SCHEME WITH (T,N) SHARED VERIFICATION, IEE proceedings. Computers and digital techniques, 145(2), 1998, pp. 117-120
Citations number
16
Categorie Soggetti
Computer Science Hardware & Architecture","Computer Science Theory & Methods","Computer Science Hardware & Architecture","Computer Science Theory & Methods
A new authenticated encryption scheme with (t, n) shared verification
based on discrete logarithms is proposed. In the scheme ally ciphertex
t of signature for a message is addressed to a specified group of veri
fiers in such a way that the ability to decrypt the ciphertext of sign
ature is regulated by the adopted (t, n) threshold scheme. That is, an
y t out of n verifiers in the group share the responsibility (or autho
rity) for message recovery. The proposed scheme preserves the merits i
nherent in the signature scheme with message recovery and the (t, n) s
hared verification scheme. As compared to Harn's (t, n) shared verific
ation scheme and its further modifications, the proposed scheme has th
e following advantages: it requires smaller bandwidth and achieves mor
e secrecy of data transmission; it is more efficient for signature ver
ification.