The authenticated encryption scheme allows onesigner to generate an authenticated cipher-text so that noone except the designated verifier can recover the messageand verify the message. In a (t, n) threshold authenticatedencryption scheme, any t or more signers can generate anauthenticated encryption for a message and send it to thedesignated verifier. Compared with the conventionalencryption-then-signature schemes, threshold authenticatedencryption schemes can meet more security requirements,including robustness, confidentiality, unforgeability,integrity, authenticity and non-repudiation. Based on Tsengand Jan’s authenticated encryption scheme and ellipticcurve cryptosystem, Chung et al. [2] recently proposed anefficient (t, n) threshold authenticated encryption schemewhich can reduce the load of the signers by applying adivision-of-labor signature technique. However, the paperdemonstrates that there exists a design defect, the thresholdauthentication signature scheme cannot resist againstinsider attack and the scheme is not robust. Then, animproved authenticated encryption scheme based on ellipticcurve cryptosystem is proposed. The novel authenticatedencryption scheme removes the above-mentionedweaknesses.
展开▼