The ring authenticated encryption scheme-how to provide a clue wisely
From MaRDI portal
Publication:1007859
DOI10.1016/J.INS.2008.09.014zbMath1156.94418DBLPjournals/isci/LvRCK09OpenAlexW2163903338WikidataQ60245088 ScholiaQ60245088MaRDI QIDQ1007859
Xiaofeng Chen, Kwangjo Kim, Kui Ren, Jiqiang Lv
Publication date: 24 March 2009
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2008.09.014
Related Items (2)
Signcryption from randomness recoverable public key encryption ⋮ Provably convertible multi-authenticated encryption scheme for generalized group communications
Cites Work
- A convertible multi-authenticated encryption scheme for group communications
- Convertible multi-authenticated encryption scheme
- Practical convertible authenticated encryption schemes using self-certified public keys
- A public key cryptosystem and a signature scheme based on discrete logarithms
- New directions in cryptography
- Group Signatures
- A method for obtaining digital signatures and public-key cryptosystems
- ID-Based Blind Signature and Ring Signature from Pairings
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: The ring authenticated encryption scheme-how to provide a clue wisely