AUTHENTICATED ENCRYPTION SCHEME BASED ON PAILLIER SYSTEM WITH VERIFIABLE PUBLIC KEYS

Tzong-Sun Wu, Yih-Sen Chen, Han-Yu Lin, and Tang-Kai Chang

References

  1. [1] T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, IT-31(4), 1985, 469–472.
  2. [2] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2), 1978, 120–126.
  3. [3] F. Hou, Z. Wang, Y. Tang, and Z. Liu, Protecting integrity and confidentiality for data communication, Proceedings of Ninth International Symposium on Computers and Communications (ISCC), 1(28), 2004, 357–362.
  4. [4] W. Stallings, Cryptography and network security: Principles and practices, 4th ed. (New Jersey: Pearson, 2005).
  5. [5] M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Journal of Cryptology, 21(4), 2008, 469–491.
  6. [6] P. Sarkar, A simple and generic construction of authenticated encryption with associated data, ACM Transactions on Information and System Security, 13(4), 2010, 33.
  7. [7] H.Y. Chien, Convertible authenticated encryption scheme without using conventional one-way function, Informatica, 14(4), 2003, 445–454.
  8. [8] H.Y. Lin and Y.S. Yeh, A novel (t, n) threshold convertible authenticated encryption scheme, Applied Mathematical Sciences, 2(5), 2008, 249–254.
  9. [9] T.S. Wu and C.L. Hsu, Convertible authenticated encryption scheme, The Journal of Systems and Software, 62(3), 2002, 205–209.
  10. [10] T.S. Wu and H.Y. Lin, Secure convertible authenticated encryption scheme based on RSA, Informatica, 33, 2009, 481– 486.
  11. [11] J. Zhang and Y. Wang, On the security of a convertible authenticated encryption, Applied Mathematics and Computation, 169(2), 2005, 1063–1069.
  12. [12] P. Horster, M. Michels, and H. Petersen, Authenticated encryption schemes with low communication costs, Electronics Letters, 30(15), 1994, 1212–1213.
  13. [13] J. Lv, X. Wang, and K. Kim, Practical convertible authenticated encryption schemes using self-certified public keys, Applied Mathematics and Computation, 169(2), 2005, 1285–1297.
  14. [14] T. Okamoto and S. Uchiyama, A new public-key cryptosystem as secure as factoring, Advances in cryptology – EUROCRYPT’98, LNCS 1403 (Berlin: Springer-Verlag, 1998), 308–318.
  15. [15] T.S. Wu, C.L. Hsu, and H.Y. Lin, Generalized convertible authenticated encryption schemes for smart card applications, International Mathematical Journal, 2(8), 2007, 345–363.
  16. [16] E.J. Yoon and K.Y. Yoo, Robust authenticated encryption scheme with message linkages, Knowledge-based intelligent information and engineering systems (KES) (Berlin: SpringerVerlag, 2005), 281–288.
  17. [17] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Advances in cryptology – EUROCRYPT’99, LNCS 1592 (Berlin: Springer-Verlag, 1999), 223–238.
  18. [18] M. Girault, Self-certified public keys, in D.W. Davies (ed.), Advances in cryptology – EUROCRYPT’91 (Berlin: SpringerVerlag, 1991), 491–497.
  19. [19] A. Shamir, RSA for paranoids, RSA Laboratories CryptoBytes, 1(3), 1995, 1–13.
  20. [20] J.M. Forsythe, Encrypted receipts for voter-verified elections using homomorphic encryption, Master Thesis, Department of Electrical Engineering and Computer, Massachusetts Institute of Technology, 2005.

Important Links:

Go Back