Authenticated encryption scheme with (t,n) shared verification and its security

被引:0
作者
Lu, J.Z.
Chen, H.Y.
机构
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2001年 / 38卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37
  • [22] An efficient convertible authenticated encryption-scheme and its variant
    Huang, HF
    Chang, CC
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392
  • [23] An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE ACCESS, 2019, 7 : 184207 - 184220
  • [24] (t,n) threshold shared verification signature scheme based on discrete logarithms
    Shi, Ronghua
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (03): : 319 - 323
  • [25] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [26] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [27] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [28] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
    Kasami, Tadao
    Yamamura, Saburo
    Mori, Kenichi
    Systems, computers, controls, 1982, 13 (03): : 59 - 69
  • [29] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    Journal of Software, 2010, 5 (07) : 697 - 704
  • [30] Secure Disk with Authenticated Encryption and IV Verification
    Hou, Fangyong
    Xiao, Nong
    Liu, Fang
    He, Hongjun
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44