2013
DOI: 10.1002/cpe.3058
|View full text |Cite
|
Sign up to set email alerts
|

Self‐certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme

Abstract: SUMMARYIn 2009, Wu and Lin introduced the concept of self‐certified proxy convertible authenticated encryption (SP‐CAE) by integrating self‐certified public‐key system and designated verifier proxy signature with message recovery. They also presented the first SP‐CAE scheme which is based the discrete logarithm problem. However, Wu‐Lin scheme is not secure as Xie et al. recently showed that this scheme is existentially forgeable under adaptive chosen warrants, unconfidentiable and verifiable under adaptive cho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Since then, many variations of self-certified CAE were proposed, for instance, self-certified proxy CAE [18,19] and convertible multi-authenticated encryption scheme [20,21], which can be used in different application situations. Interested readers can refer to these literatures [15,[17][18][19][20][21] for more detailed discussions. Elaborating on the merits inherent in the self-certified public key systems, the authors will propose efficient and computationally indistinguishable self-certified CAE schemes in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Since then, many variations of self-certified CAE were proposed, for instance, self-certified proxy CAE [18,19] and convertible multi-authenticated encryption scheme [20,21], which can be used in different application situations. Interested readers can refer to these literatures [15,[17][18][19][20][21] for more detailed discussions. Elaborating on the merits inherent in the self-certified public key systems, the authors will propose efficient and computationally indistinguishable self-certified CAE schemes in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…The special issue consists of 13 papers organized as follows. The first five papers are devoted to intelligent secure data analysis, encryption, and authentication techniques. The next three papers present intelligent optimization and data processing techniques, including genetic algorithms, independent component analysis, and evolutionary game theory.…”
mentioning
confidence: 99%