Return to search

Message authentication in an identity-based encryption scheme: 1-Key-Encrypt-Then-MAC

We present an Identity-Based Encryption scheme, 1-Key-Encrypt-Then-MAC, in which we are able to verify the authenticity of messages using a MAC. We accomplish this authentication by combining an Identity-Based Encryption scheme given by Boneh and Franklin, with an Identity-Based Non-Interactive Key Distribution given by Paterson and Srinivasan, and attaching a MAC. We prove the scheme is chosen plaintext secure and chosen ciphertext secure, and the MAC is existentially unforgeable. / by Brittanney Jaclyn Amento. / Thesis (M.S.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.

Identiferoai:union.ndltd.org:fau.edu/oai:fau.digital.flvc.org:fau_3547
ContributorsAmento, Brittanney Jaclyn, Charles E. Schmidt College of Science, Department of Mathematical Sciences
PublisherFlorida Atlantic University
Source SetsFlorida Atlantic University
LanguageEnglish
Detected LanguageEnglish
TypeText, Electronic Thesis or Dissertation
Formatvi, 23 p., electronic
Rightshttp://rightsstatements.org/vocab/InC/1.0/

Page generated in 0.0016 seconds