Abstract
A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature that can be verified by anyone. In this paper, we elaborate on the merits of CAE and secret sharing schemes to propose two new (t,n) threshold authenticated encryption schemes for hierarchical structures. Our proposed schemes not only allow i-th level participants to support the (i+1)-th level participants to generate the authenticated encryption messages, but also allow the participants of i-th or higher levels to cooperatively generate the valid ones. Any authenticated ciphertext for a message is addressed to a specified group of signers in such a way that the ability to generate the ciphertext is regulated by the adopted (t,n) threshold schemes. Furthermore, the proposed schemes achieve the security requirements of an authenticated encryption scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)
Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure. In: Proceedings of IEEE Global Telecommunications Conference – Globecom 1987, pp. 99–102 (1987)
Pedersen, T.P.: Non-interactive and information-theoretic verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129–140. Springer, Heidelberg (1992)
Chaum, D., Pedersen, M.E.: Transferred cash grows in size. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 390–407. Springer, Heidelberg (1993)
Nyberg, K., Rueppel, R.A.: A new signature scheme based on the DSA giving message recovery. In: Proceedings of the 1st ACM Conference on Computer and communication security, Fairfax, VA, pp. 58–61 (1993)
Horster, P., Michels, M., Petersen, H.: Authenticated encryption schemes with low communication costs. Electronics Letters 30(15), 1212–1213 (1994)
Nyberg, K., Rueppel, R.A.: Message recovery for signature scheme based on the discrete logarithm problem. Des. Codes. Cryptogr. 7(1-2), 61–81 (1996)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1997)
Hossein, G., Josef, P., Rei, S.N.: Secret sharing in multilevel and compartmented groups. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 367–378. Springer, Heidelberg (1998)
Araki, S., Uehara, S., Imamura, K.: The limited verifier signature and its application. IEICE Transactions on Fundamentals E82-A (1), 63–68 (1999)
Wu, T.C., Liao, H.J., He, W.H.: Verifiable multisecret sharing schemes for hierarchical organizations. In: Proceedings of the Tenth National Conference on Information Security, pp. 298–304 (2000)
Wu, T.S., Hsu, C.L.: Convertible authenticated encryption scheme. The Journal of Systems and Software 62(3), 205–209 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hsu, CL., Lin, YL., Wu, TC., Su, CH. (2010). Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations. In: Kim, Th., Chang, A.CC., Li, M., Rong, C., Patrikakis, C.Z., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17587-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-17587-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17586-2
Online ISBN: 978-3-642-17587-9
eBook Packages: Computer ScienceComputer Science (R0)