Authenticated encryption scheme with (t,n) shared verification and its security

被引:0
作者
Lu, J.Z.
Chen, H.Y.
机构
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2001年 / 38卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
[21]   An Improved Authenticated Encryption Scheme [J].
Li, Fagen ;
Deng, Jiang ;
Takagi, Tsuyoshi .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11) :2171-2172
[22]   An efficient convertible authenticated encryption-scheme and its variant [J].
Huang, HF ;
Chang, CC .
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 :382-392
[23]   An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security [J].
Kar, Jayaprakash ;
Naik, Kshirasagar ;
Abdelkader, Tamer .
IEEE ACCESS, 2019, 7 :184207-184220
[24]   (t,n) threshold shared verification signature scheme based on discrete logarithms [J].
Shi, Ronghua .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (03) :319-323
[25]   On the security of two authenticated encryption schemes [J].
Zhang, Jianhong ;
Ji, Cheng .
PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, :1315-1319
[26]   A novel authenticated encryption scheme with convertibility [J].
Thadvai, Sandeep ;
Tiwari, Deep Narayan ;
Jena, Debasish ;
Ma, Maode .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) :178-185
[27]   Key Assignment Scheme with Authenticated Encryption [J].
Kandele, Suyash ;
Paul, Souradyuti .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) :150-196
[28]   Improvement on a threshold authenticated encryption scheme [J].
Tan Z. .
Journal of Software, 2010, 5 (07) :697-704
[29]   KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY. [J].
Kasami, Tadao ;
Yamamura, Saburo ;
Mori, Kenichi .
Systems, computers, controls, 1982, 13 (03) :59-69
[30]   A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security [J].
Mihaljevic, Miodrag J. .
ENTROPY, 2019, 21 (07)