Convertible multi-authenticated encryption scheme
From MaRDI portal
Publication:2465980
DOI10.1016/j.ins.2007.06.011zbMath1134.94370OpenAlexW1979725714WikidataQ120853994 ScholiaQ120853994MaRDI QIDQ2465980
Tzong-Sun Wu, Han-Yu Lin, Tzong-Chen Wu, Chien-Lung Hsu, Kuo-Yu Tsai
Publication date: 11 January 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.06.011
Related Items (8)
Improved convertible authenticated encryption scheme with provable security ⋮ A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME ⋮ A convertible multi-authenticated encryption scheme for group communications ⋮ Secure public-key encryption scheme without random oracles ⋮ Provably secure proxy convertible authenticated encryption scheme based on RSA ⋮ Provably convertible multi-authenticated encryption scheme for generalized group communications ⋮ The ring authenticated encryption scheme-how to provide a clue wisely ⋮ A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Simulatability and security of certificateless threshold signatures
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
- The state of elliptic curve cryptography
- A novel efficient \((t,n)\) threshold proxy signature scheme
- New scheme for digital multisignatures
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- A digital multisignature scheme using bijective public-key cryptosystems
- Introduction to cryptography. Principles and applications
This page was built for publication: Convertible multi-authenticated encryption scheme