Skip to main content

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations

  • Conference paper
Book cover Communication and Networking (FGCN 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 119))

  • 505 Accesses

Abstract

A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature that can be verified by anyone. In this paper, we elaborate on the merits of CAE and secret sharing schemes to propose two new (t,n) threshold authenticated encryption schemes for hierarchical structures. Our proposed schemes not only allow i-th level participants to support the (i+1)-th level participants to generate the authenticated encryption messages, but also allow the participants of i-th or higher levels to cooperatively generate the valid ones. Any authenticated ciphertext for a message is addressed to a specified group of signers in such a way that the ability to generate the ciphertext is regulated by the adopted (t,n) threshold schemes. Furthermore, the proposed schemes achieve the security requirements of an authenticated encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  2. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  3. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  4. Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Proceedings of IEEE Global Telecommunications Conference – Globecom 1987, pp. 99–102 (1987)

    Google Scholar 

  5. Pedersen, T.P.: Non-interactive and information-theoretic verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)

    Google Scholar 

  6. Chaum, D., Pedersen, M.E.: Transferred cash grows in size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390–407. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  7. Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Proceedings of the 1st ACM Conference on Computer and communication security, Fairfax, VA, pp. 58–61 (1993)

    Google Scholar 

  8. Horster, P., Michels, M., Petersen, H.: Authenticated encryption schemes with low communication costs. Electronics Letters 30(15), 1212–1213 (1994)

    Article  Google Scholar 

  9. Nyberg, K., Rueppel, R.A.: Message recovery for signature scheme based on the discrete logarithm problem. Des. Codes. Cryptogr. 7(1-2), 61–81 (1996)

    Article  MATH  Google Scholar 

  10. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1997)

    MATH  Google Scholar 

  11. Hossein, G., Josef, P., Rei, S.N.: Secret sharing in multilevel and compartmented groups. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 367–378. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Araki, S., Uehara, S., Imamura, K.: The limited verifier signature and its application. IEICE Transactions on Fundamentals E82-A (1), 63–68 (1999)

    Google Scholar 

  13. Wu, T.C., Liao, H.J., He, W.H.: Verifiable multisecret sharing schemes for hierarchical organizations. In: Proceedings of the Tenth National Conference on Information Security, pp. 298–304 (2000)

    Google Scholar 

  14. Wu, T.S., Hsu, C.L.: Convertible authenticated encryption scheme. The Journal of Systems and Software 62(3), 205–209 (2002)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hsu, CL., Lin, YL., Wu, TC., Su, CH. (2010). Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations. In: Kim, Th., Chang, A.CC., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17587-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17587-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17586-2

  • Online ISBN: 978-3-642-17587-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics