Signcryption scheme with threshold shared unsigncryption preventing malicious receivers
暂无分享,去创建一个
Zhang Zhang | Zhang Zhang | Cai Mian | Qu Jin | Cai Mian | Qu Jin
[1] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Tzong-Chen Wu,et al. Authenticated encryption scheme with (t, n) shared verification , 1998 .
[4] Huo Yan Chen,et al. Improvement of authenticated encryption scheme with (t, n) shared verification , 2000, Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000.
[5] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[6] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[7] Yuliang Zheng,et al. The SPEED Cipher , 1997, Financial Cryptography.