Efficient Deniably Authenticated Encryption and Its Application to E-Mail

Fagen Li, Di Zhong, Tsuyoshi Takagi

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet mail extensions (S/MIME) are two famous secure e-mail solutions. Both PGP and S/MIME use digital envelope to provide message confidentiality and digital signature to provide message authentication. However, these methods have the following two weaknesses: 1) digital signature provides non-repudiation evidence of sender that is not desired in some e-mail applications and 2) efficiency is low, since these methods use two kinds of public key cryptographic primitives: public key encryption and digital signature. To overcome the above two weaknesses, we introduce a new concept called deniably authenticated encryption that can achieve confidentiality, integrity, and deniable authentication in a logical single step. We first propose a deniably authenticated encryption scheme and prove its security in the random oracle model. Then, we design a secure e-mail protocol using the proposed deniably authenticated encryption scheme. The deniable authentication property protects senders' privacy.

Original languageEnglish
Article number7499859
Pages (from-to)2477-2486
Number of pages10
JournalIEEE Transactions on Information Forensics and Security
Volume11
Issue number11
DOIs
Publication statusPublished - Nov 1 2016

Fingerprint

Electronic mail
Authentication
Electronic document identification systems
Cryptography
Internet
Network protocols

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

Efficient Deniably Authenticated Encryption and Its Application to E-Mail. / Li, Fagen; Zhong, Di; Takagi, Tsuyoshi.

In: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 11, 7499859, 01.11.2016, p. 2477-2486.

Research output: Contribution to journalArticle

Li, Fagen ; Zhong, Di ; Takagi, Tsuyoshi. / Efficient Deniably Authenticated Encryption and Its Application to E-Mail. In: IEEE Transactions on Information Forensics and Security. 2016 ; Vol. 11, No. 11. pp. 2477-2486.
@article{f737cf0f78514bc7beabc7022e082135,
title = "Efficient Deniably Authenticated Encryption and Its Application to E-Mail",
abstract = "Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet mail extensions (S/MIME) are two famous secure e-mail solutions. Both PGP and S/MIME use digital envelope to provide message confidentiality and digital signature to provide message authentication. However, these methods have the following two weaknesses: 1) digital signature provides non-repudiation evidence of sender that is not desired in some e-mail applications and 2) efficiency is low, since these methods use two kinds of public key cryptographic primitives: public key encryption and digital signature. To overcome the above two weaknesses, we introduce a new concept called deniably authenticated encryption that can achieve confidentiality, integrity, and deniable authentication in a logical single step. We first propose a deniably authenticated encryption scheme and prove its security in the random oracle model. Then, we design a secure e-mail protocol using the proposed deniably authenticated encryption scheme. The deniable authentication property protects senders' privacy.",
author = "Fagen Li and Di Zhong and Tsuyoshi Takagi",
year = "2016",
month = "11",
day = "1",
doi = "10.1109/TIFS.2016.2585086",
language = "English",
volume = "11",
pages = "2477--2486",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "11",

}

TY - JOUR

T1 - Efficient Deniably Authenticated Encryption and Its Application to E-Mail

AU - Li, Fagen

AU - Zhong, Di

AU - Takagi, Tsuyoshi

PY - 2016/11/1

Y1 - 2016/11/1

N2 - Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet mail extensions (S/MIME) are two famous secure e-mail solutions. Both PGP and S/MIME use digital envelope to provide message confidentiality and digital signature to provide message authentication. However, these methods have the following two weaknesses: 1) digital signature provides non-repudiation evidence of sender that is not desired in some e-mail applications and 2) efficiency is low, since these methods use two kinds of public key cryptographic primitives: public key encryption and digital signature. To overcome the above two weaknesses, we introduce a new concept called deniably authenticated encryption that can achieve confidentiality, integrity, and deniable authentication in a logical single step. We first propose a deniably authenticated encryption scheme and prove its security in the random oracle model. Then, we design a secure e-mail protocol using the proposed deniably authenticated encryption scheme. The deniable authentication property protects senders' privacy.

AB - Confidentiality and authentication are two main security goals in secure electronic mail (e-mail). Pretty good privacy (PGP) and secure/multipurpose internet mail extensions (S/MIME) are two famous secure e-mail solutions. Both PGP and S/MIME use digital envelope to provide message confidentiality and digital signature to provide message authentication. However, these methods have the following two weaknesses: 1) digital signature provides non-repudiation evidence of sender that is not desired in some e-mail applications and 2) efficiency is low, since these methods use two kinds of public key cryptographic primitives: public key encryption and digital signature. To overcome the above two weaknesses, we introduce a new concept called deniably authenticated encryption that can achieve confidentiality, integrity, and deniable authentication in a logical single step. We first propose a deniably authenticated encryption scheme and prove its security in the random oracle model. Then, we design a secure e-mail protocol using the proposed deniably authenticated encryption scheme. The deniable authentication property protects senders' privacy.

UR - http://www.scopus.com/inward/record.url?scp=84984996884&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84984996884&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2016.2585086

DO - 10.1109/TIFS.2016.2585086

M3 - Article

AN - SCOPUS:84984996884

VL - 11

SP - 2477

EP - 2486

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 11

M1 - 7499859

ER -