Authenticated Encryption Schemes based on Self-Certified Public Key Cryptosystems
管理學院 - 資訊管理系
Department of Information Management
|Thesis Publication Year:||2017|
|Graduation Academic Year:||105|
|Keywords (in Chinese):||公開金鑰密碼學 、多簽章 、秘密分享 、鑑別加密機制 、門檻鑑別加密機制|
|Keywords (in other languages):||Public key cryptography, Multisignature, Secret sharing, Authenticated encryption scheme, Threshold authenticated encryption scheme|
|Reference times:||Clicks: 125 Downloads: 0|
|School Collection Retrieve National Library Collection Retrieve Error Report|
Public key cryptosystem is a popular and mature technology, which has been applied to various domains such as E-commerce, stock transaction, online payment and electronic voting. In general, public key cryptosystem achieves the following security features for information systems: (1) only the genuine receiver can read the content of a targeted message; (2) the genuine receiver can verify whether the message was sent by the original sender; (3) the content of sent message cannot be tampered. In other words, public key cryptosystem achieves confidentiality, integrity, and non-repudiation. In order to adopt public key cryptosystem into devices with less computing resources and low storage space, researchers had proposed authenticated encryption schemes based on self-certified public key cryptosystem. However, traditional authenticated encryption schemes have the following issues: (1) the total size of a message will dynamically increase in proportion to the size of message content with the usage of cyclic redundancy check mechanism; (2) signature-based authenticated encryption schemes do not consider the need of group-based applications; (3) multisignature-based authenticated encryption schemes do not consider the need of message recovery. In consequence, traditional authenticated encryption schemes are not suitable for securing group-based collaborating applications and social networking applications in modern societies; traditional authenticated encryption schemes are also not suitable for various devices of smart city. Therefore, this dissertation applied advantages about small storage space and low computation cost of self-certified public key cryptosystem and introduced three mulitisignature protocol designs based on self-certified public key cryptosystem to enhance security features of traditional authenticated encryption and be suitable for various devices of smart city. The first proposed multisignature protocol design abandoned cyclic redundancy check mechanism and added message recovery capability. The second proposed mulitisignature protocol design utilized Shamir’s secret sharing concept for group communication. A message signature for a targeted message content can be built by group members and the original message content can be recovered through signature verification with collaboration of members; moreover, every group member can validate the authenticated message individually. The third proposed mulitisignature protocol is based on the second proposed protocol; a message chaining scheme is developed for messages with large contents.
 R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
 W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976.
 T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
 I. Ray and N. Narasimhamurthi, “An Anonymous Electronic Voting Protocol for Voting over the Internet,” International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems, pp. 180-190, 2001.
 B. Amann, R. Sommer, M. Vallentin, and S. Hall, “No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships,” in Proceedings of the 29th Annual Computer Security Applications Conference, pp. 179-188, 2013.
 A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1996.
 A. Shamir, “Identity-based Cryptosystems and Signature Schemes,” Proceeding of CRYPTO, pp. 47-53, 1984.
 M. Girault, “Self-certified Public Keys,” Proceeding of EUROCRYPT, pp. 490-497, 1991.
 H. Du and Q. Wen, “Certificateless Proxy Multi-signature,” Information Sciences, Vol. 276, pp. 21-30, 2014.
 S.J. Hwang and Y.H. Lee, “Repairing ElGamal-like Multi-signature Schemes using Self-certified Public Keys,” Applied Mathematics and Computation, Vol. 156, pp.73-83, 2004.
 Z. Shao, “Improvement of Efficient Proxy Signature Schemes using Self-certified Public Keys,” Applied Mathematics and Computation, Vol. 168, pp. 222-234, 2005.
 Y.P. Liao and C.M. Hsiao, “A Novel Multi-server Remote User Authentication Scheme using Self-certified Public Keys for Mobile Clients,” Future Generation Computer Systems, Vol. 29, No. 3, pp. 886-900, 2013.
 C.H. Tseng, S.H. Wang, and W.J. Tsaur, “Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection,” IEEE Transaction ON Reliability, Vol. 64, No. 3, pp. 1078-1085, 2015.
 D. Guo, Q. Wen, W. Li, H. Zhang, and Z. Jin, “A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems,” Journal of Medical Systems, Vol. 39, No. 6, pp. 1-8, 2015.
 M.A. Simplicio Jr, M.V.M. Silva, R.C.A. Alves, and T.K.C. Shibata, “Lightweight and Escrow-less Authenticated Key Agreement for the Internet of Things,” Computer Communications, Vol. 98, pp. 43-51.
 S. Rostampour, N. Bagheri, M. Hosseinzadeh, and A. Khademzadeh, “An Authenticated Encryption Based Grouping Proof Protocol for RFID Systems,” Security and Communication Networks, Article in Press, 2017.
 P. Gope and T. Hwang, "BSN-Care: A Secure IoT-based Modern Healthcare System using Body Sensor Network," IEEE Sensors Journal, Vol. 16, No. 5, pp. 1368-1376, 2016.
 K. Nyberg and R.A. Rueppel, “A New Signature Scheme based on the DSA Giving Message Recovery,” Proceedings of ACM Conference on Computer and Communications Security, pp. 58-61, 1993.
 S.J. Hwang and H.C. Liao, “Security of Hsu-Wu’s Authenticated Encryption Scheme with (t,n) Shared Verification,” Applied Mathematics and Computation, Vol. 167, No. 1, pp. 281-285, 2005.
 C.L. Hsu and T.C. Wu, “Authenticated Encryption Scheme with (t, n) Shared Verification,” IEE Proceedings - Computers and Digital Techniques, Vol. 145, No. 2, pp. 117-120, 1998.
 A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
 M. Ben-Or, O. Goldreich, S. Micali, and R.L. Rivest, “A Fair Protocol for Signing Contracts,” IEEE Transactions on Information Theory, Vol. 36, No. 1, pp. 40-46, 1990.
 R.S. Rajasree and S.V. Pede, “An Abuse-Free Optimistic Signature Exchange Protocol using Block Cipher,” International Conference on Computing Communication Control and Automation, pp. 256-260, 2015.
 L. Harn and C.H. Lin, “Contract Signature in E-commerce,” Computers and Electrical Engineering, Vol. 37, No. 2, pp. 169-173, 2011.
 National Institute of Standards and Technology, “NIST Special Publication 800-131A,” National Institute of Standards and Technology Technical Series Publications, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-131a.pdf (accessed Mar 3, 2017).
 J. Daemen and V. Rijmen, “The Design of Rijndael: AES - The Advanced Encryption Standard,” Springer Berlin Heidelberg, 2002.
 P. Horster, M. Michels, and H. Petersen, “Authenticated Encryption Schemes with Low Communication Costs,” Electronics Letters, Vol. 30, No. 15, pp. 1212-1213, 1994.
 S. Araki, S. Uehara, and K. Imamura, “The Limited Verifier Signature and Its Application,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 1, pp. 63-68, 1999.
 T.S. Wu and C.L. Hsu, “Convertible Authenticated Encryption Scheme,” Journal of Systems and Software, Vol. 62, No. 3, pp. 205-209, 2002.
 H.F. Huang and C.C. Chang, “An Efficient Convertible Authenticated Encryption Scheme and Its Variant,” International Conference on Information and Communications Security, pp. 382-392, 2003.
 Y.M. Tseng, J.K. Jan, and H.Y. Chien, “Digital Signature with Message Recovery using Self-Certified Public Keys and Its Variants,” Applied Mathematics and Computation, Vol. 136, No. 2-3, pp. 203-214, 2003.
 J. Lv, X. Wang, and K. Kim, “Practical Convertible Authenticated Encryption Schemes using Self-certified Public Keys,” Applied Mathematics and Computation, Vol. 169, No. 2, pp. 1285-1297, 2005.
 C.C. Lee, M.S. Hwang, and S.F. Tzeng, “A New Convertible Authenticated Encryption Scheme based on The Elgamal Cryptosystem,” International Journal of Foundations of Computer Science, Vol. 20, No. 2, pp. 351-359, 2009.
 H.Y. Lin, C.L. Hsu, and S.K. Huang, “Improved Convertible Authenticated Encryption Scheme with Provable Security,” Information Processing Letters, Vol. 111, No. 13, pp. 661-666, 2011.
 F. Wu and L. Xu, “An Improved and Provable Self-Certified Digital Signature Scheme with Message Recovery,” International Journal of Communication Systems, Vol. 28, No. 2, pp. 344-357, 2015.
 C.Y. Tsai, C.Y. Liu, S.C. Tsaur, and M.S. Hwang, “A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms,” International Journal of Network Securit, Vol. 19, No. 3, pp. 443-448, 2017.
 C.Y. Yeun, “Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) -A Comparison,” Lecture Notes in Computer Science, Vol. 1746, pp. 307-312, 1999.
 D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, “RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” Internet Engineering Task Force. http://tools.ietf.org/html/rfc5280 (accessed Mar 3, 2017).
 J. Zhang, H. Chen, S. Gao, and Q. Geng, “Comment on a Digital Signature Scheme with Using Self-certified Public Keys,” International Forum on Information Technology and Applications, pp. 678-680, 2009.
 M.S. Hwang, C.C. Yang, and S.F. Tzeng, “Improved Digital Signature Scheme Based on Factoring and Discrete Logarithms,” Journal of Discrete Mathematical Sciences and Cryptography, Vol. 5, No. 2, pp. 151-155, 2002.
 L. Harn and T. Kresler, “New Scheme for Digital Multisignatures,” Electronics Letters, Vol. 25, No. 15, pp. 1002-1003, 1989.
 L. Harn, “Group-oriented (t, n) Threshold Digital Signature Scheme and Digital Multisignature,” IEE Proceedings-Computers and Digital Techniques, Vol. 141, No. 5, pp. 307-313, 1994.
 C.T. Wang, C.H. Lin, and C.C. Chang, “Threshold Signature Schemes with Traceable Signers in Group Communications,” Computer Communications, Vol. 21, No. 8, pp. 771-776, 1998.
 T.S. Wu and C.L. Hsu, “Threshold Signature Scheme using Self-Certified Public Keys,” Journal of Systems and Software, Vol. 67, No. 2, pp. 89-97, 2003.
 W.B. Lee and K.C. Liao, “Improved Self-certified Group-oriented Cryptosystem without a Combiner,” Journal of Systems and Software, Vol. 79, No. 4, pp. 502-506, 2006.
 T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, and T.C. Wu, “Convertible Multi-authenticated Encryption Scheme,” Information Sciences, Vol. 178, No. 1, pp. 256-263, 2008.
 J.L. Tsai, “Convertible Multi-authenticated Encryption Scheme with One-way Hash Function,” Computer Communications, Vol. 32, No. 5, pp. 783-786, 2009.
 C.F. Lu, C.L. Hsu, and H.Y. Lin, “Provably Convertible Multi-authenticated Encryption Scheme for Generalized Group Communications,” Information Sciences, Vol. 199, pp. 154-166, 2012.
 D. Liu, X. Wang, and M. Huang, “Strongly Unforgeable Threshold Multi-proxy Multi-signature Scheme with Different Proxy Groups,” International Journal of Communication Systems, Vol. 27, No. 12, pp. 3693-3705, 2014.
 H. Bao, Z. Cao, and S. Wang, “Remarks on Wu-Hsu’s Threshold Signature Scheme using Self-Certified Public Keys,” Journal of Systems and Software, Vol. 78, No. 1, pp. 56-59, 2005.
 H. Ghodosi and S. Saeednia, “Modification to Self-certified Group-oriented Cryptosystem without Combiner,” Electronics Letters, Vol. 37, No. 2, pp. 86-87, 2001.