Novel convertible authenticated encryption schemes without using hash functions
暂无分享,去创建一个
[1] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[2] Chin-Chen Chang,et al. An Efficient Convertible Authenticated Encryption Scheme and Its Variant , 2003, ICICS.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] H. Petersen,et al. Cryptanalysis and improvement of signcryption schemes , 1998 .
[5] S. Araki,et al. The Limited Verifier Signature and Its Application , 1999 .
[6] Chien-Lung Hsu,et al. Convertible authenticated encryption scheme , 2002, J. Syst. Softw..
[7] Patrick Horster,et al. Authenticated encryption schemes with low communication costs , 1994 .
[8] Chin-Chen Chang,et al. Authenticated encryption scheme without using a one way function , 1995 .
[9] V. Conclusion , .
[10] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[11] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[12] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[13] Han-Yu Lin,et al. Convertible multi-authenticated encryption scheme , 2008, Inf. Sci..
[15] Hung-Yu Chien,et al. Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function , 2003, Informatica.