Abstract | ||
---|---|---|
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1016/j.amc.2004.08.017 | Applied Mathematics and Computation |
Keywords | Field | DocType |
elliptic curve,message recovery,general signature equation,authenticated encryption scheme,proposed scheme,encryption scheme,signature equation,known plaintext,digital signature,forgery attack,signature scheme with message recovery,elliptic curve cryptosystem,it security,authenticated encryption | Elliptic Curve Digital Signature Algorithm,Mathematical optimization,Authentication,Known-plaintext attack,Algorithm,Elliptic curve cryptosystem,Digital signature,Elliptic curve cryptography,Authenticated encryption,Elliptic curve,Mathematics,Distributed computing | Journal |
Volume | Issue | ISSN |
168 | 1 | Applied Mathematics and Computation |
Citations | PageRank | References |
4 | 0.46 | 2 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zemao Zhao | 1 | 19 | 3.32 |
Feng-Yu Liu | 2 | 9 | 1.26 |