scispace - formally typeset
Journal ArticleDOI

Signature with message recovery

Kefei Chen
- 01 Oct 1998 - 
- Vol. 34, Iss: 20, pp 1934-1934
TLDR
A new signature scheme with message recovery is proposed, based on the discrete logarithms problem and has the same efficiency as the HMP and its modified schemes, but is simpler.
Abstract
A new signature scheme with message recovery is proposed. The new scheme is based on the discrete logarithms problem and has the same efficiency as the HMP and its modified schemes, but is simpler.

read more

Citations
More filters
Book ChapterDOI

Efficient ID-based digital signatures with message recovery

TL;DR: Two new ID-based signature schemes with message recovery are proposed, one of which can deal with messages of fixed length and the second one that can dealWith messages of arbitrary length, and both are proven secure in the random oracle model.
Book ChapterDOI

Digital Signature with Message Recovery and Authenticated Encryption (Signcryption)-A Comparison

TL;DR: It is shown that there are major differences between a digital signature scheme with message recovery and authenticated encryption scheme by proposing a digital signatures withmessage recovery scheme and signcryption scheme as an example for comparison.
Proceedings ArticleDOI

An Improved Signcryption Scheme and Its Variation

TL;DR: This paper proposes an improved signcryption scheme and a variant scheme providing message recovery, revised from an authenticated encryption scheme which has been found to have a security-flaw and provides an additional property called the public verifiability of the signature.
DissertationDOI

Forward security from bilinear pairings: signcryption and threshold signature

TL;DR: This study utilizes bilinear pairing to devise an ID-based signcryption scheme which close the open problem, and a threshold signature scheme which is efficient in key updates and round-optimal in signing, both of which are forward-secure so that the security of the systems will not be completely broken even key exposure occurs.

Design, analysis and applications of cryptographic techniques

TL;DR: A modified version of the Pinch multiple secret sharing protocol is proposed, which identifies all cheaters, regardless of their number, improving on previous results by Ghodosi et al.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Message recovery for signature schemes based on the discrete logarithm problem

TL;DR: It is shown how to combine ElGamal encryption and the message recovery scheme of [9] and how to securely integrate the DSA into Diffie-Hellman key exchange.
Journal ArticleDOI

Authenticated encryption schemes with low communication costs

TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.
Journal ArticleDOI

Authenticated encryption scheme without using a one way function

TL;DR: A modified HMPs authenticated encryption scheme with the same low expansion rate and lower communication costs but without the use of a one way function is proposed.