共 18 条
[1]
Boyer J., Chaum D., Damgard I., Pederson T., Convertible undeniable signatures, Crypto'90, pp. 189-205, (1991)
[2]
Chen K., Message recovery for signature schemes based on the discrete logarithm, Designs, Codes and Cryptography, 7, 1-2, pp. 61-81, (1998)
[3]
Elgamal T., A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information and Theory, 31, 4, pp. 469-472, (1985)
[4]
Hsu C.-L., Wu T.-C., Authenticated encryption schemes with (t, n) shared verification, IEE Proceedings in Computers and Digital Technology, 145, 2, pp. 117-120, (1998)
[5]
Hwang M.-S., Chang C.-C., Hwang K.-F., An ElGamal-like cryptosystem for enciphering large messages, IEEE Transaction on Knowledge and Data Engineering, 14, 2, pp. 445-446, (2002)
[6]
Hwang M.-S., Hsiao J.-Y., Chu Y.-P., Improvement of authenticated encryption schemes with message linkages for message flows, IEICE Transactions on Information and Systems, E89-D, 4, pp. 1575-1577, (2006)
[7]
Hwang M.-S., Liu C.-Y., Authenticated encryption schemes: Current status and key issues, International Journal of Network Security, 1, 2, pp. 61-73, (2005)
[8]
Lee W.-B., Chang C.-C., Authenticated encryption schemes without using a one way function, Electronic Letters, 31, 19, pp. 1656-1657, (1995)
[9]
Lee M., Kim D., Park K., An authenticated encryption scheme with public verifiability, Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), pp. 49-56, (2000)
[10]
Nyberg K., Rueppel R.A., A new signature scheme based on the DSA giving message recovery, 1st ACM Conference on Computer and Communications Security, pp. 58-61, (1993)