A parallel authenticated encryption sharing scheme based on cellular automata

Adrian Hernandez-Becerrjl, Mariko Nakano-Miyatake, Hector Perez-Meana, A. R. Bucio, M. P. Ramirez-Tachiquin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple secret sharing scheme (SSS) against adaptive chosen cipher text attack, we introduce an authenticated encryption (Encrypt-then-MAC) based on ICeccak function to a cellular automata based SSS. Taking the advantage that each cell of the cellular automata can be processed independently, we parallelize the processes of the SSS through CUDA technology, obtaining considerable reduction of the temporal complexity. The processing time of the proposed scheme is evaluated comparing with its sequential version and the speed-up rate of the parallel algorithm respect to the sequential one is 34 times in the best case.

Original languageEnglish
Title of host publicationWorld Congress on Engineering, WCE 2014
EditorsS. I. Ao, Jon Burgstone, S. I. Ao, Craig Douglas, Warren S. Grundfest, Craig Douglas, Jon Burgstone, S. I. Ao
PublisherNewswood Limited
Pages62-67
Number of pages6
ISBN (Electronic)9789881925206
ISBN (Print)9789881925275
StatePublished - 2014
EventWorld Congress on Engineering and Computer Science 2014, WCECS 2014 - San Francisco, United States
Duration: 22 Oct 201424 Oct 2014

Publication series

NameLecture Notes in Engineering and Computer Science
Volume1
ISSN (Print)2078-0958

Conference

ConferenceWorld Congress on Engineering and Computer Science 2014, WCECS 2014
Country/TerritoryUnited States
CitySan Francisco
Period22/10/1424/10/14

Keywords

  • Authenticated encryption
  • Cellular automata
  • Cryptography
  • Parallel processing
  • Secret sharing

Fingerprint

Dive into the research topics of 'A parallel authenticated encryption sharing scheme based on cellular automata'. Together they form a unique fingerprint.

Cite this