Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Authenticated encryption schemes with linkage between message blocks
Information Processing Letters
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Convertible authenticated encryption scheme
Journal of Systems and Software
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
A Scheme for Obtaining a Message from the Digital Multisignature
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Concealment and its applications to authenticated encryption
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Cryptanalysis and improvement of a multisignature scheme
IWDC'05 Proceedings of the 7th international conference on Distributed Computing
A multisignature scheme for implementing safe delivery rule in group communication systems
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
New directions in cryptography
IEEE Transactions on Information Theory
Improved convertible authenticated encryption scheme with provable security
Information Processing Letters
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Provably convertible multi-authenticated encryption scheme for generalized group communications
Information Sciences: an International Journal
Hi-index | 0.24 |
To send the message to the recipient securely, authenticated encryption schemes were proposed. In 2008, Wu et al. [T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, T.C. Wu, Convertible multi-authenticated encryption scheme, Information Sciences 178 (1) 256-263.] first proposed a convertible multi-authenticated encryption scheme based on discrete logarithms. However, the author finds that the computational complexity of this scheme is rather high and the message redundancy is used. To improve the computational efficiency and remove the message redundancy, the author proposes a new convertible multi-authenticated encryption scheme based on the intractability of one-way hash functions and discrete logarithms. As for efficiency, the computation cost of the proposed scheme is smaller than Wu et al.'s scheme.