AUTHENTICATED ENCRYPTION SCHEME WITH (T,N) SHARED VERIFICATION

Authors
Citation
Cl. Hsu et Tc. Wu, AUTHENTICATED ENCRYPTION SCHEME WITH (T,N) SHARED VERIFICATION, IEE proceedings. Computers and digital techniques, 145(2), 1998, pp. 117-120
Citations number
16
Categorie Soggetti
Computer Science Hardware & Architecture","Computer Science Theory & Methods","Computer Science Hardware & Architecture","Computer Science Theory & Methods
ISSN journal
13502387
Volume
145
Issue
2
Year of publication
1998
Pages
117 - 120
Database
ISI
SICI code
1350-2387(1998)145:2<117:AESW(S>2.0.ZU;2-2
Abstract
A new authenticated encryption scheme with (t, n) shared verification based on discrete logarithms is proposed. In the scheme ally ciphertex t of signature for a message is addressed to a specified group of veri fiers in such a way that the ability to decrypt the ciphertext of sign ature is regulated by the adopted (t, n) threshold scheme. That is, an y t out of n verifiers in the group share the responsibility (or autho rity) for message recovery. The proposed scheme preserves the merits i nherent in the signature scheme with message recovery and the (t, n) s hared verification scheme. As compared to Harn's (t, n) shared verific ation scheme and its further modifications, the proposed scheme has th e following advantages: it requires smaller bandwidth and achieves mor e secrecy of data transmission; it is more efficient for signature ver ification.