Convertible multi-authenticated encryption scheme for data communication

被引:0
|
作者
Huang, Hui-Feng [1 ]
Lin, Pin-Han [1 ]
Tsai, Min-Hsuan [1 ]
机构
[1] Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, 129 Sec. 3, Sanmin Rd., Taichung,404, Taiwan
关键词
22;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:40 / 48
相关论文
共 50 条
  • [41] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [42] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [43] Improvement on a threshold authenticated encryption scheme
    Tan Z.
    [J]. Journal of Software, 2010, 5 (07) : 697 - 704
  • [44] Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version
    Chang, Ting-Yi
    Yang, Chou-Chen
    Hwang, Min-Shiang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 151 - 162
  • [45] Security Analysis of a Convertible Multiauthenticated Encryption Scheme
    Zhang Jian Hong
    Liu Xue
    Liu ChengLian
    [J]. MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
  • [46] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [47] Is RCB a Leakage Resilient Authenticated Encryption Scheme?
    Abed, Farzaneh
    Berti, Francesco
    Lucks, Stefan
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
  • [48] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY
    Chen, Tzung-Her
    Li, Ct-Lin
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
  • [49] A secure authenticated encryption scheme and its extension
    Zhang, Jianhong
    Cheng, Ji
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
  • [50] Improvement of publicly verifiable authenticated encryption scheme
    雷飞宇
    陈雯
    马昌社
    陈克非
    [J]. Journal of Harbin Institute of Technology(New series), 2007, (01) : 26 - 28