Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.
Citation:
Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.
Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.
Citation:
Zhang Chuan-rong, Fu Xiao-tong, Xiao Guo-zhen. Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes[J]. Journal of Electronics & Information Technology, 2006, 28(1): 151-153.
Convertible authenticated encryption schemes are studied in this paper. The problems in Wu-Hsus scheme (2002) and Huang-Changs scheme (2003) are pointed out. Furthermore the improvements of the two schemes are given; for that, the public verification of authenticated encryption schemes is solved as well.
Araki S, Uehara S, Imamura K. Convertible limited verifier signature based on horsters authenticated encryption. 1998 Symposium on Cryptography and Information Security. Ham- anako, Japan, 32.36.[2]Wu T S, Hsu C L. Convertible authenticated encryption scheme[J].The Journal of Systems and Software.2002,62(3):205-