The Traditional Authenticated Encryption (AE) scheme is a single-user cryptographic\nmechanism which only enables one designated verifier to authenticate the ciphertext. Although\nseveral group-oriented AE variants have also been proposed to eliminate such a limitation, they\nrequire shared verification. This motivated us to think of a scenario of three-party communication\nenvironments where each party runs independent processes without cooperation. In this paper,\nwe realize a novel three-party AE (abbreviated to TPAE) scheme in which two designated verifiers\ncan solely decrypt the same ciphertext and then inspect the validity of embedded signature.\nAdditionally, we also show that our TPAE construction is computationally secure using the\nwell-defined IND-CCA2 and the EF-CMA adversary games in the proof model of random oracles.\nThe comparison results will demonstrate the computational efficiency of our mechanism.
Loading....