Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The digital signature standard
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Convertible authenticated encryption scheme
Journal of Systems and Software
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Hi-index | 0.00 |
An authenticated encryption allows the designated recipient to verify the authenticity while recovering the message. To protect the recipient's benefit in case of a later dispute, a convertible authenticated encryption scheme allows the recipient to convert the authenticated encryption into an ordinary signature so that it becomes a publicly verifiable. This paper shows a universal forgery attack on Araki et al.'s convertible authenticated encryption scheme, and proposes a new convertible authenticated encryption scheme. Without using any conventional one-way function, the proposed scheme simplifies its security assumption on only a public hard problem - the discrete logarithm problem.