Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem

  title={Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem},
  author={Nedal Tahat},
  journal={Int. J. Comput. Appl. Technol.},
  • N. Tahat
  • Published 2016
  • Computer Science, Mathematics
  • Int. J. Comput. Appl. Technol.
The work presents a Convertible Multi-Authenticated Encryption CMAE scheme based on the Elliptic Curve Discrete Logarithm Problem ECDLP. The proposed scheme intended to develop the CMAE scheme to improve performance as compared to the other existing schemes. Most CMAE schemes are very high in computational overhead and memory usage problem. This scheme desired to reduce time-consuming problem by using Elliptic Curve Cryptography ECC. In addition, the proposed scheme provides good resistance to… 

Tables from this paper

Identity-based threshold group signature scheme based on multiple hard number theoretic problems

A new identity-based threshold signature technique, which is based on a pair of intractable problems, residuosity and discrete logarithm, that is immune to the four most familiar attack types in relation to the signature schemes.

A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions

The author presents a novel verifiable authenticated encryption (VAE) scheme with the functionality of recipient proof and shows that the proposed VAE scheme is non-delegatable and provably secure under the random oracle proof models.

A Secure Mutually Authentication Scheme in Integration of Internet and MANET based on Chaos Maps

The proposed method mutually authenticated key agreement protocol provides a mechanism to securely agree the session key between source and destination and provides a better approach towards security and protection of data from malicious nodes with minimum overhead in IIM.


A Secure Intelligence Algorithm (SIA) for data transmission between mobile node and fixed node in IIM provides effective elimination of misbehavior nodes and lower computational cost in key agreement process when compared to existing strategies.

Design and implementation of a new cooperative approach to brain tumour identification from MRI images

This research work aims to carry out a new cooperative approach to brain tumour detection and identification from MRI images with good segmentation accuracy by applying K-means algorithm to optimise the initial centroids of the improved fuzzy C-mean which incorporates the spatial information.



A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function

This paper proposes a secure CMAE scheme, in which it enhances the semantic security of the message to overcome the defect in Tsai's scheme, and the performance of the proposed scheme is more efficient thanTsai's in term of computational complexity.

Convertible multi-authenticated encryption scheme with one-way hash function

On the security of a convertible authenticated encryption

Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function

A universal forgery attack on Araki et al.'s convertible authenticated encryption scheme is shown, and a new convertible authenticatedryption scheme is proposed that simplifies its security assumption on only a public hard problem - the discrete logarithm problem.

The State of Elliptic Curve Cryptography

This paper surveys the development of elliptic curve cryptosystems from their inception in 1985 by Koblitz and Miller to present day implementations.

Convertible authenticated encryption scheme

Authenticated encryption schemes with low communication costs

The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.

Convertible multi-authenticated encryption scheme

A New Partially Blind Signature Based on Factoring and Discrete Logarithms

This study proposes a secure partially blind signature scheme based on factoring and discrete logarithms and shows that the proposed scheme satisfies the partial blindness, randomization, unlinkability and unforgeability properties.

Extensions to ciphertext-policy attribute-based encryption to support distributed environments

We present several extensions to the ciphertext-policy attribute-based encryption CP-ABE scheme, first introduced by Bethencourt et al. in 2007, to support operation in a distributed environment with