2019
DOI: 10.1016/j.ins.2018.10.055
|View full text |Cite
|
Sign up to set email alerts
|

Practical public key encryption with selective opening security for receivers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Other available MAC schemes are Cipher Block Chaining MAC (CBC-MAC) and MAC based on universal hashing (UMAC). MACs can be created either using symmetric key-based approaches [35] or public keybased approaches [36]. Among various symmetric key-based approaches, the secret key polynomial based message authentication scheme is considered the most effective one.…”
Section: Message Authentication Code a Message Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Other available MAC schemes are Cipher Block Chaining MAC (CBC-MAC) and MAC based on universal hashing (UMAC). MACs can be created either using symmetric key-based approaches [35] or public keybased approaches [36]. Among various symmetric key-based approaches, the secret key polynomial based message authentication scheme is considered the most effective one.…”
Section: Message Authentication Code a Message Authenticationmentioning
confidence: 99%
“…RRFS calculates a new session key for every session. The computational cost is calculated based on equation (36).…”
Section: Performance Evaluationmentioning
confidence: 99%
“…So, it is a research focus of cryptography to develop other new cryptosystems. e traditional cryptosystems are based on various commutative rings, such as finite field, residue class ring, and integer ring [4][5][6][7][8]. Many cryptologists hope to find other algebraic structures to build new public key cryptosystems.…”
Section: Introductionmentioning
confidence: 99%