Journal ArticleDOI
Publicly verifiable authenticated encryption
TLDR
Ma and Chen have proposed an authenticated encryption scheme with public verifiability which claims that the TTP can publicly verify the sender's signature without running a zero knowledge proof protocol.Abstract:
Ma and Chen have proposed an authenticated encryption scheme with public verifiability. The scheme claims that the TTP can publicly verify the sender's signature without running a zero knowledge proof protocol. The problem in verification which causes the TTP to reject a valid signature with non-negligible probability is pointed out.read more
Citations
More filters
Journal Article
Authenticated Encryption Schemes: Current Status and Key Issues
Min-Shiang Hwang,Chi-Yu Liu +1 more
TL;DR: The evolution and the existed problems of authenticated encryption schemes are discussed and the scheme is very suitable for the key agreement application, because a key is a small amount of a message.
Posted Content
Efficient Authenticated Encryption Schemes with Public Verifiability
TL;DR: In 2003, Ma and Chen proposed a scheme with public verifiability as discussed by the authors, in which the receiver can efficiently prove to a third party that a message is indeed originated from a specific sender.
Proceedings ArticleDOI
Efficient authenticated encryption schemes with public verifiability
TL;DR: This work identifies two security weaknesses in the Ma-Chen authenticated encryption scheme and proposes an efficient and secure improved scheme such that all the desired security requirements are satisfied.
Book ChapterDOI
Security Analysis of Two Signcryption Schemes
TL;DR: This paper presents a security analysis of the Huang-Chang convertible signc encryption scheme and the Kwak-Moon group signcryption scheme, and shows that both schemes are insecure.
Proceedings ArticleDOI
RFID Security Protocol by Lightweight ECC Algorithm
TL;DR: This paper designs a lightweight RFID security protocol based on the ID Blind Scheme and ECC allowing an additional ECC modular operation and offers enhanced security feature inRFID security with respect to user privacy against tag cloning.
References
More filters
Journal ArticleDOI
Authenticated encryption schemes with low communication costs
TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.
Journal ArticleDOI
Authenticated encryption scheme without using a one way function
Wei-Bin Lee,Chin-Chen Chang +1 more
TL;DR: A modified HMPs authenticated encryption scheme with the same low expansion rate and lower communication costs but without the use of a one way function is proposed.
Journal ArticleDOI
Publicly verifiable authenticated encryption
Changshe Ma,Kefei Chen +1 more
TL;DR: A new authenticated encryption scheme with public verifiability that requires less computational costs and communication overhead than the conventional signature-then-encryption approaches and is not divulged during the public verification.