2002
DOI: 10.1016/s0164-1212(01)00143-1
|View full text |Cite
|
Sign up to set email alerts
|

Convertible authenticated encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 66 publications
(50 citation statements)
references
References 6 publications
0
50
0
Order By: Relevance
“…We compare the proposed scheme with some previous ones including Araki et al's (AUI for short) [1], Sekhar's (Sek for short) [17], the Wu-Hsu (WH for short) [19], Lee et al's (LHT for short) [16], Chien's (Chi for short) [2] and the Wu-Lin (WL for short) [20] schemes. Detailed comparisons in terms of functionalities and security are demonstrated as Table 1.…”
Section: Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…We compare the proposed scheme with some previous ones including Araki et al's (AUI for short) [1], Sekhar's (Sek for short) [17], the Wu-Hsu (WH for short) [19], Lee et al's (LHT for short) [16], Chien's (Chi for short) [2] and the Wu-Lin (WL for short) [20] schemes. Detailed comparisons in terms of functionalities and security are demonstrated as Table 1.…”
Section: Comparisonsmentioning
confidence: 99%
“…A convertible authenticated encryption (CAE) scheme was first proposed by Wu and Hsu [19] in 2002, which preserves the merits of AE scheme and Araki et al's one. In case of a later dispute over repudiation, the designated recipient has the ability to solely convert the ciphertext into an ordinary signature for public verification.…”
Section: Introductionmentioning
confidence: 99%
“…Most importantly, disputation arbitration is realized in [12]. However, the secret message must be released in the course of disputation arbitration in [11]. This problem was declared to be solved in [12].…”
Section: Authenticated Encryption Schemementioning
confidence: 99%
“…This approach is not successful, if the signer doesn't want to co-operate. Wu and Hsu (2003), proposed an efficient CAE scheme, in which the conversion procedure is very easy and only recipient can solely manage this process, without any heavy computation. Huang and Chang (2003), point out that Wu and Hsu (2003), scheme is not safe, since the adversary is capable of signature conversion, if he has the knowledge of the actual message and project an improvised scheme.…”
Section: Introductionmentioning
confidence: 99%
“…Wu and Hsu (2003), proposed an efficient CAE scheme, in which the conversion procedure is very easy and only recipient can solely manage this process, without any heavy computation. Huang and Chang (2003), point out that Wu and Hsu (2003), scheme is not safe, since the adversary is capable of signature conversion, if he has the knowledge of the actual message and project an improvised scheme. Unfortunately, Wang et al (2004), scheme given by Huang and Chang (2003), is also insecure against known plain text attack.…”
Section: Introductionmentioning
confidence: 99%