A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography and data security
Cryptography and data security
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Two Simple Batch Verifying Multiple Digital Signatures
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
Untraceable blind signature schemes based on discrete logarithm problem
Fundamenta Informaticae
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
Wireless Personal Communications: An International Journal
A key authentication scheme with non-repudiation
ACM SIGOPS Operating Systems Review
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
A new multi-stage secret sharing scheme using one-way function
ACM SIGOPS Operating Systems Review
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Fundamenta Informaticae
Cryptanalysis on an Elgamal-like cryptosystem for encrypting large messages
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
International Journal of Ad Hoc and Ubiquitous Computing
Comments on the security of Chen's authenticated encryption scheme
Computers and Electrical Engineering
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Fundamenta Informaticae
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem
Fundamenta Informaticae
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
On the Security of Self-Certified Public Keys
International Journal of Information Security and Privacy
On the security of two improved authenticated encryption schemes
International Journal of Security and Networks
Hi-index | 0.00 |
In practice, we usually require two cryptosystems, an asymmetric one and a symmetric one, to encrypt a large confidential message. The asymmetric cryptosystem is used to deliver secret key $SK$, while the symmetric cryptosystem is used to encrypt a large confidential message with the secret key $SK$. In this article, we propose a simple cryptosystem which allows a large confidential message to be encrypted efficiently. Our scheme is based on the Diffie-Hellman distribution scheme, together with the ElGamal cryptosystem.