Advanced Search
Volume 28 Issue 1
Sep.  2010
Turn off MathJax
Article Contents
Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.
Citation: Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.

Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes

  • Received Date: 2004-07-20
  • Rev Recd Date: 2004-12-20
  • Publish Date: 2006-01-19
  • Convertible authenticated encryption schemes are studied in this paper. The problems in Wu-Hsus scheme (2002) and Huang-Changs scheme (2003) are pointed out. Furthermore the improvements of the two schemes are given; for that, the public verification of authenticated encryption schemes is solved as well.
  • loading
  • Araki S, Uehara S, Imamura K. Convertible limited verifier signature based on horsters authenticated encryption. 1998 Symposium on Cryptography and Information Security. Ham- anako, Japan, 32.36.[2]Wu T S, Hsu C L. Convertible authenticated encryption scheme[J].The Journal of Systems and Software.2002,62(3):205-
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2232) PDF downloads(889) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return