A threshold authenticated encryption scheme using hybrid problems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Threshold Authenticated Encryption Scheme Using Hybrid Problems

In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems. We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Security analysis shows that our scheme will remain secure even if one of these problems can be solved.

متن کامل

Improvement on a Threshold Authenticated Encryption Scheme

The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encry...

متن کامل

A Novel (t,n) Threshold Convertible Authenticated Encryption Scheme

Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that only the designated recipient has the ability to recover the message and verify its corresponding signature. It can be seen that authenticated encryption schemes are applicable to lots of E-Commerce applications like credit card transactions, since these schemes simultaneously fulfill the securit...

متن کامل

A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. [1] proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, we showed that the scheme has a design flaw. Then, we propo...

متن کامل

An Enhanced Threshold Authenticated Encryption Scheme with Convertibility

Recently, Chung et al. (2009) proposed a novel and valuable threshold authenticated encryption scheme. Unfortunately, it has a potential weakness: if the secret message involves criminal evidence or illegal content, the designated receiver cannot authenticate the secret message in the later dispute. The authors of this paper aim at enhancing Chung et al.’s scheme by adding the convertibility ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Mathematical Sciences

سال: 2014

ISSN: 1314-7552

DOI: 10.12988/ams.2014.4142