Sciweavers

Share
75 search results - page 1 / 15
» Practical convertible authenticated encryption schemes using...
Sort
View
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
9 years 11 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
AMC
2005
138views more  AMC 2005»
9 years 11 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
IJNSEC
2008
91views more  IJNSEC 2008»
9 years 11 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
10 years 4 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and eļ¬ƒcient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
MOBIHOC
2005
ACM
10 years 11 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
books