2003
DOI: 10.1016/s0045-7906(01)00010-6
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated encryption schemes with message linkages for message flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(21 citation statements)
references
References 15 publications
0
21
0
Order By: Relevance
“…We compare the security and performance of the improved scheme with those of the Tseng-Jan-Chien scheme [1] and Hwang et al's scheme [2] in Table 1. For convenience, the following notation is used to analyze the performance evaluation of the improved schemes: T e is the time for executing a modular exponentiation operation; T m is the time for executing a modular multiplication operation; T i is the time for executing a modular inverse operation; T h is the time for executing a one-way hash function; |x| is the bit-length of an integer x.…”
Section: Analysis Of the Improved Schemementioning
confidence: 99%
See 1 more Smart Citation
“…We compare the security and performance of the improved scheme with those of the Tseng-Jan-Chien scheme [1] and Hwang et al's scheme [2] in Table 1. For convenience, the following notation is used to analyze the performance evaluation of the improved schemes: T e is the time for executing a modular exponentiation operation; T m is the time for executing a modular multiplication operation; T i is the time for executing a modular inverse operation; T h is the time for executing a one-way hash function; |x| is the bit-length of an integer x.…”
Section: Analysis Of the Improved Schemementioning
confidence: 99%
“…From Table 1, we know that both Tseng-Jan-Chien scheme [1] and Hwang et al's scheme [2] do not satisfy the unforgeability and non-repudiation. Our scheme satisfy the unforgeability, confidentiality and non-repudiation.…”
Section: Analysis Of the Improved Schemementioning
confidence: 99%
“…Similar to Tseng et al [12], the improved schemes proposed by Hwang et al consist of three phases: the system initialization phase, the signing phase, and the message recovery phase. Here, we only focus on the basic scheme but our attack also applies to the generalized scheme.…”
Section: Hwang Et Al Improved Authenticated Encryption Schemesmentioning
confidence: 99%
“…Tseng et al [12] proposed two efficient authenticated encryption schemes with message linkages. The first scheme is a basic one that requires the recipient (verifier) to wait until she receives all of the signature blocks before she can recover any of the received message blocks.…”
Section: Introductionmentioning
confidence: 99%
“…Authenticated encryption is the digital signature with a message recovery function. It can combine the functions of digital signature and encryption (Lee and Chang 1995;Tseng et al 2003). The signer may generate the signature for a message and only the specified receiver can recover and verify the message.…”
Section: Introductionmentioning
confidence: 99%