Authenticated encryption scheme with (t,n) shared verification and its security

被引:0
作者
Lu, J.Z.
Chen, H.Y.
机构
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2001年 / 38卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
[31]   Secure Disk with Authenticated Encryption and IV Verification [J].
Hou, Fangyong ;
Xiao, Nong ;
Liu, Fang ;
He, Hongjun .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :41-44
[32]   A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets [J].
Lin, Han-Yu .
SYMMETRY-BASEL, 2019, 11 (05)
[33]   On the security of two improved authenticated encryption schemes [J].
Informatics Department, Electronics Research Institute, Cairo, Egypt .
Int. J. Secur. Netw., 2013, 4 (194-199) :194-199
[34]   On the security of generalization of threshold signature and authenticated encryption [J].
Tseng, Yuh-Min ;
Jan, Jinn-Ke ;
Chien, Hung-Yu .
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) :2606-2609
[35]   On the security of generalization of threshold signature and authenticated encryption [J].
Tseng, YM ;
Jan, JK ;
Chien, HY .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10) :2606-2609
[36]   Authenticated encryption and steganography in unconditional security setting [J].
Matsumoto, T ;
Shikata, J .
2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, :1-6
[37]   An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment [J].
Yang, Jen-Ho ;
Chang, Ya-Fen ;
Chen, Yi-Hui .
INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04) :315-324
[38]   Security Analysis of Two Authenticated Encryption Schemes [J].
Zhang, Jianhong ;
Geng, Qin .
2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, :158-163
[39]   Authenticated encryption scheme based on quadratic residue [J].
Chen, KF .
ELECTRONICS LETTERS, 1998, 34 (22) :2115-2116
[40]   Is RCB a Leakage Resilient Authenticated Encryption Scheme? [J].
Abed, Farzaneh ;
Berti, Francesco ;
Lucks, Stefan .
SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 :39-52