http://scholars.ntou.edu.tw/handle/123456789/5850
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Han-Yu Lin | en_US |
dc.date.accessioned | 2020-11-19T11:15:37Z | - |
dc.date.available | 2020-11-19T11:15:37Z | - |
dc.date.issued | 2019-12-18 | - |
dc.identifier.issn | 1392-124X | - |
dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/5850 | - |
dc.description.abstract | When it comes to secure transactions online, the requirements of confidentiality and authenticity are usually concerned the most. The former prevents unauthorized reading, while the latter ensures authorized access. Hybrid cryptographic mechanisms such as authenticated encryption (AE) schemes, simultaneously combine the functions of public key encryption and digital signature. Some AE schemes also provide a cost-free arbitration mechanism to deal with the signer’s later repudiation. Such schemes have been found to have numerous practical applications like on-line credit card transactions, confidential contract signing and the protection of digital evidence, etc. However, a designated verifier should also have the ability to convince any third party that he/she is indeed the intended recipient. In this paper, the author presents a novel verifiable authenticated encryption (VAE) scheme with the functionality of recipient proof. Furthermore, the paper shows that the proposed VAE scheme is non-delegatable and provably secure under the random oracle proof models. A non-delegatable hybrid cryptographic scheme provides a higher security level even if the shared common key is compromised. Specifically, the author of the paper will demonstrate that the designed construction is proved secure against adaptive chosen-ciphertext attacks (CCA2) assuming the hardness of Bilinear Square Diffie-Hellman Problem (BSDHP) and secure against adaptive chosen-message attacks (CMA) assuming the hardness of q-Strong Diffie-Hellman Problems (q-SDHP). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Kaunas University of Technology | en_US |
dc.relation.ispartof | Information Technology and Control | en_US |
dc.subject | verifiable authenticated encryption | en_US |
dc.subject | non-delegatable | en_US |
dc.subject | bilinear square Diffie-Hellman problem | en_US |
dc.subject | q-strong Diffie-Hellman problem | en_US |
dc.subject | public key system | en_US |
dc.title | A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions | en_US |
dc.type | journal article | en_US |
dc.identifier.doi | <Go to ISI>://WOS:000510403000006 | - |
dc.identifier.doi | <Go to ISI>://WOS:000510403000006 | - |
dc.identifier.doi | 10.5755/j01.itc.48.4.23454 | - |
dc.identifier.doi | <Go to ISI>://WOS:000510403000006 | - |
dc.identifier.doi | <Go to ISI>://WOS:000510403000006 | - |
dc.identifier.url | <Go to ISI>://WOS:000510403000006 | |
dc.relation.journalvolume | 48 | en_US |
dc.relation.journalissue | 4 | en_US |
item.cerifentitytype | Publications | - |
item.openairetype | journal article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
item.fulltext | no fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
crisitem.author.dept | Department of Computer Science and Engineering | - |
crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 資訊工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。