1994
DOI: 10.1049/el:19940856
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated encryption schemes with low communication costs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
52
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 129 publications
(52 citation statements)
references
References 2 publications
0
52
0
Order By: Relevance
“…Zheng (1997), in his paper gave a new method for AE called signcryption. In his approach the parties involved (Message signer, Message receiver and Third party) have more interaction than the Horster et al (1994). In this way the problem of nonrepudiation is removed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Zheng (1997), in his paper gave a new method for AE called signcryption. In his approach the parties involved (Message signer, Message receiver and Third party) have more interaction than the Horster et al (1994). In this way the problem of nonrepudiation is removed.…”
Section: Introductionmentioning
confidence: 99%
“…No other entity is able to recuperate the original message and check the genuineness of the signature attached with the message. Horster et al (1994), introduced the concept of Authenticated Encryption (AE) scheme which encrypt and authenticate message simultaneously in a very efficient manner. One of the draw backs of their scheme is non -repudiation, because, the message recipient is not able to prove that the message he receives is sent by the specified user only.…”
Section: Introductionmentioning
confidence: 99%
“…It was firstly presented in [8]. Improvements were then made in [9] and [10]. Most importantly, disputation arbitration is realized in [12].…”
Section: Authenticated Encryption Schemementioning
confidence: 99%
“…For facilitating more and more diversified applications such as credit card transactions, contract signings and on-line auctions, in 1994, Horster et al [5] proposed a so-called authenticated encryption (AE) scheme which could simultaneously satisfy the properties of confidentiality [6,9,10] and authenticity [11,13,18]. In an AE scheme, a signer can generate an authenticated ciphertext such that only the designated recipient is capable of decrypting the ciphertext and then verifying the signature.…”
Section: Introductionmentioning
confidence: 99%