Abstract | ||
---|---|---|
In this article, we present an authenticated encryption scheme with message linkages used to deliver a large message. To protect the receiver's benefit, the receiver can easily convert the signature into an ordinary one that can be verified by anyone. Several feasible attacks will be discussed, and the security analysis will prove that none of them can successfully break the proposed scheme. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1016/j.compeleceng.2006.02.005 | Computers & Electrical Engineering |
Keywords | Field | DocType |
feasible attack,large message,message recovery,authenticated encryption scheme,new convertible authenticated encryption,security analysis,proposed scheme,message linkage,discrete logarithms,digital signature,discrete logarithm,authenticated encryption | Multiple encryption,Computer science,Computer security,Computer network,Encryption,Probabilistic encryption,40-bit encryption,On-the-fly encryption,Authenticated encryption,56-bit encryption,Sponge function | Journal |
Volume | Issue | ISSN |
33 | 2 | Computers and Electrical Engineering |
Citations | PageRank | References |
4 | 0.49 | 13 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shiang-feng Tzeng | 1 | 273 | 27.20 |
Yuan-Liang Tang | 2 | 70 | 10.28 |
Min-Shiang Hwang | 3 | 3351 | 272.18 |