scispace - formally typeset
Journal ArticleDOI

Publicly verifiable authenticated encryption

Hsiang-An Wen, +2 more
- 10 Nov 2003 - 
- Vol. 39, Iss: 19, pp 1382-1383
TLDR
Ma and Chen have proposed an authenticated encryption scheme with public verifiability which claims that the TTP can publicly verify the sender's signature without running a zero knowledge proof protocol.
Abstract
Ma and Chen have proposed an authenticated encryption scheme with public verifiability. The scheme claims that the TTP can publicly verify the sender's signature without running a zero knowledge proof protocol. The problem in verification which causes the TTP to reject a valid signature with non-negligible probability is pointed out.

read more

Citations
More filters
Journal Article

Authenticated Encryption Schemes: Current Status and Key Issues

TL;DR: The evolution and the existed problems of authenticated encryption schemes are discussed and the scheme is very suitable for the key agreement application, because a key is a small amount of a message.
Posted Content

Efficient Authenticated Encryption Schemes with Public Verifiability

TL;DR: In 2003, Ma and Chen proposed a scheme with public verifiability as discussed by the authors, in which the receiver can efficiently prove to a third party that a message is indeed originated from a specific sender.
Proceedings ArticleDOI

Efficient authenticated encryption schemes with public verifiability

TL;DR: This work identifies two security weaknesses in the Ma-Chen authenticated encryption scheme and proposes an efficient and secure improved scheme such that all the desired security requirements are satisfied.
Book ChapterDOI

Security Analysis of Two Signcryption Schemes

TL;DR: This paper presents a security analysis of the Huang-Chang convertible signc encryption scheme and the Kwak-Moon group signcryption scheme, and shows that both schemes are insecure.
Proceedings ArticleDOI

RFID Security Protocol by Lightweight ECC Algorithm

TL;DR: This paper designs a lightweight RFID security protocol based on the ID Blind Scheme and ECC allowing an additional ECC modular operation and offers enhanced security feature inRFID security with respect to user privacy against tag cloning.
References
More filters
Journal ArticleDOI

Authenticated encryption schemes with low communication costs

TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.
Journal ArticleDOI

Authenticated encryption scheme without using a one way function

TL;DR: A modified HMPs authenticated encryption scheme with the same low expansion rate and lower communication costs but without the use of a one way function is proposed.
Journal ArticleDOI

Publicly verifiable authenticated encryption

TL;DR: A new authenticated encryption scheme with public verifiability that requires less computational costs and communication overhead than the conventional signature-then-encryption approaches and is not divulged during the public verification.
Related Papers (5)