Authenticated encryption scheme with (t,n) shared verification and its security

被引:0
作者
Lu, J.Z.
Chen, H.Y.
机构
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2001年 / 38卷 / 09期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
[41]   AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY [J].
Chen, Tzung-Her ;
Li, Ct-Lin .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11) :6177-6185
[42]   Improvement of publicly verifiable authenticated encryption scheme [J].
雷飞宇 ;
陈雯 ;
马昌社 ;
陈克非 .
Journal of Harbin Institute of Technology, 2007, (01) :26-28
[43]   Dynamic Threshold Proxy Authenticated Encryption Scheme [J].
Song Yubo ;
Hu Aiqun .
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, :4637-4640
[44]   Convertible multi-authenticated encryption scheme [J].
Wu, Tzong-Sun ;
Hsu, Chien-Lung ;
Tsai, Kuo-Yu ;
Lin, Han-Yu ;
Wu, Tzong-Chen .
INFORMATION SCIENCES, 2008, 178 (01) :256-263
[45]   Robust authenticated encryption scheme with message linkages [J].
Yoon, EJ ;
Yoo, KY .
KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 4, PROCEEDINGS, 2005, 3684 :281-288
[46]   An Efficient Scheme of Authenticated Encryption with Associated Data [J].
Zhang, Shaolan ;
Xing, Guobo ;
Yang, Yixian .
2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, :4217-+
[47]   TriviA: A Fast and Secure Authenticated Encryption Scheme [J].
Chakraborti, Avik ;
Chattopadhyay, Anupam ;
Hassan, Muhammad ;
Nandi, Mridul .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :330-353
[48]   IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON [J].
Al-Shatari, Mohammed ;
Hussin, Fawnizu Azmadi ;
Aziz, Azrina Abd ;
Eisa, Taiseer Abdalla Elfadil ;
Tran, Xuan-Tu ;
Dalam, Mhassen Elnour Elneel .
APPLIED SCIENCES-BASEL, 2023, 13 (18)
[49]   Convertible multi-authenticated encryption scheme with verification based on elliptic curve discrete logarithm problem [J].
Tahat, Nedal .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2016, 54 (03) :229-235
[50]   Concealment and its applications to authenticated encryption [J].
Dodis, Y ;
An, JH .
ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 :312-329