scispace - formally typeset
Journal ArticleDOI

Publicly verifiable authenticated encryption

Changshe Ma, +1 more
- 06 Feb 2003 - 
- Vol. 39, Iss: 3, pp 281-282
Reads0
Chats0
TLDR
A new authenticated encryption scheme with public verifiability that requires less computational costs and communication overhead than the conventional signature-then-encryption approaches and is not divulged during the public verification.
Abstract
A new authenticated encryption scheme with public verifiability is presented. The new scheme requires less computational costs and communication overhead than the conventional signature-then-encryption approaches. Furthermore the message is not divulged during the public verification.

read more

Citations
More filters
Journal Article

Authenticated Encryption Schemes: Current Status and Key Issues

TL;DR: The evolution and the existed problems of authenticated encryption schemes are discussed and the scheme is very suitable for the key agreement application, because a key is a small amount of a message.
Journal ArticleDOI

Synchronization of a novel fractional order stretch-twist-fold (STF) flow chaotic system and its application to a new authenticated encryption scheme (AES)

TL;DR: In this paper, a new fractional order stretch-twist-fold (STF) flow dynamical system is proposed and the stability analysis of the proposed system equilibria is accomplished and the system is exhibited chaos even for order less than 3.
Book ChapterDOI

Efficient ID-based digital signatures with message recovery

TL;DR: Two new ID-based signature schemes with message recovery are proposed, one of which can deal with messages of fixed length and the second one that can dealWith messages of arbitrary length, and both are proven secure in the random oracle model.
Journal ArticleDOI

A Convertible Multi-Authenticated Encryption scheme for group communications

TL;DR: This study shows that not only can a multi-authenticated ciphertext signature be generated by a signing group, but also the message can be recovered and verified by a verifying group with multiple verifiers.
Proceedings ArticleDOI

Efficient authenticated encryption schemes with public verifiability

TL;DR: This work identifies two security weaknesses in the Ma-Chen authenticated encryption scheme and proposes an efficient and secure improved scheme such that all the desired security requirements are satisfied.
References
More filters
Book ChapterDOI

Security proofs for signature schemes

TL;DR: This paper establishes the generality of this technique against adaptively chosen message attacks and achieves such a security proof for a slight variant of the El Garrial signature schemc where committed values are hashed together with the message.
Journal ArticleDOI

Authenticated encryption schemes with low communication costs

TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.
Book ChapterDOI

Signcryption and Its Applications in Efficient Public Key Solutions

TL;DR: This paper summarizes currently known construction methods for signcryption, carries out a comprehensive comparison between signc encryption and “signature followed by encryption”, and suggests a number of applications of signcrypted in the search of efficient security solutions based on public key cryptography.
Journal ArticleDOI

Authenticated encryption scheme without using a one way function

TL;DR: A modified HMPs authenticated encryption scheme with the same low expansion rate and lower communication costs but without the use of a one way function is proposed.
Journal Article

Signcryption and its Applications in Efficient Public Key Solutions

TL;DR: Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by the traditional signature followed by encryption approach as discussed by the authors.