Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
New directions in cryptography
IEEE Transactions on Information Theory
A convertible group signature scheme
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
A new convertible authenticated encryption scheme with message linkages
Computers and Electrical Engineering
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
An efficient and secure pairing-based fair blind signature scheme with message recovery
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
The ring authenticated encryption scheme - How to provide a clue wisely
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
New identity-based key-insulated convertible multi-authenticated encryption scheme
Journal of Network and Computer Applications
Hi-index | 0.00 |
The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose. To protect the recipient's benefit in the case of a later dispute, we should further enable the recipient to convert the signature into an ordinary one that can be verified by anyone. Recently, Araki et al. proposed a convertible limited verifier scheme to resolve the problem. Their scheme equips the recipient with the ability to convert the signature into an ordinary one. However, the conversion requires the cooperation of the signer. In the paper, we proposed a convertible authenticated encryption scheme that can easily produce the ordinary signature without the cooperation of the signer. Further, the proposed scheme is more efficient than Araki et al.'s in terms of the computation complexities and the communication costs.