Journal ArticleDOI
Signature with message recovery
TLDR
A new signature scheme with message recovery is proposed, based on the discrete logarithms problem and has the same efficiency as the HMP and its modified schemes, but is simpler.Abstract:
A new signature scheme with message recovery is proposed. The new scheme is based on the discrete logarithms problem and has the same efficiency as the HMP and its modified schemes, but is simpler.read more
Citations
More filters
Book ChapterDOI
Efficient ID-based digital signatures with message recovery
TL;DR: Two new ID-based signature schemes with message recovery are proposed, one of which can deal with messages of fixed length and the second one that can dealWith messages of arbitrary length, and both are proven secure in the random oracle model.
Book ChapterDOI
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption)-A Comparison
TL;DR: It is shown that there are major differences between a digital signature scheme with message recovery and authenticated encryption scheme by proposing a digital signatures withmessage recovery scheme and signcryption scheme as an example for comparison.
Proceedings ArticleDOI
An Improved Signcryption Scheme and Its Variation
TL;DR: This paper proposes an improved signcryption scheme and a variant scheme providing message recovery, revised from an authenticated encryption scheme which has been found to have a security-flaw and provides an additional property called the public verifiability of the signature.
DissertationDOI
Forward security from bilinear pairings: signcryption and threshold signature
Chow, Sze-ming, Sherman.,周斯明. +1 more
TL;DR: This study utilizes bilinear pairing to devise an ID-based signcryption scheme which close the open problem, and a threshold signature scheme which is efficient in key updates and round-optimal in signing, both of which are forward-secure so that the security of the systems will not be completely broken even key exposure occurs.
Design, analysis and applications of cryptographic techniques
TL;DR: A modified version of the Pinch multiple secret sharing protocol is proposed, which identifies all cheaters, regardless of their number, improving on previous results by Ghodosi et al.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI
Message recovery for signature schemes based on the discrete logarithm problem
Kaisa Nyberg,Rainer A. Rueppel +1 more
TL;DR: It is shown how to combine ElGamal encryption and the message recovery scheme of [9] and how to securely integrate the DSA into Diffie-Hellman key exchange.
Journal ArticleDOI
Authenticated encryption schemes with low communication costs
TL;DR: The authors present schemes in which the communication costs are low in comparison to the basic scheme and which can be constructed from the Nyberg-Rueppel digital signature scheme.
Journal ArticleDOI
Authenticated encryption scheme without using a one way function
Wei-Bin Lee,Chin-Chen Chang +1 more
TL;DR: A modified HMPs authenticated encryption scheme with the same low expansion rate and lower communication costs but without the use of a one way function is proposed.
Related Papers (5)
Message recovery for signature schemes based on the discrete logarithm problem
Kaisa Nyberg,Rainer A. Rueppel +1 more