COMMENTS ON A THRESHOLD AUTHENTICATED ENCRYPTION SCHEME

Zuowen Tan

References

  1. [1] W. Diffie & M. Hellman, New directions in cryptography, Information Theory, IEEE Transactions, 22(6), 1976, 644–654.
  2. [2] Y. Zheng, Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) +cost (encryption), Advances in Cryptology-CRYPTO’97, LNCS 1296, SpringerVerlag, 1997, 165–179.
  3. [3] K. Nyberg & R.A. Rueppel, A new signature scheme based on the DSA giving message recovery, Proc 1st ACM Conf. on Computer and Communications Security, Fairfax, VA, 1993, 58–61.
  4. [4] K. Nyberg & R.A. Rueppel, Message recovery for signature schemes based on the discrete logarithm, Advances in Cryptology – EUROCRYPT’94, LNCS 917, Springer-Verlag, 1994, 175–190.
  5. [5] P. Horster, M. Michels, & H. Petersen, Authenticated encryption schemes with low communication costs, Electronics Letters, 30, 1994, 1212–1213.
  6. [6] W.B. Lee & C.C. Chang, Authenticated encryption scheme without using a one way function, Electronics Letters, 31(19), 1995, 1656–1657.
  7. [7] S.J. Hwang, C.C. Chang, & W.P. Yang, Authenticated encryption schemes with message linkage, Information Processing Letters, 58, 1996, 189–194.
  8. [8] W.B. Lee & C.C. Chang, Authenticated encryption schemes with linkage between message blocks, Information Processing Letters, 63, 1997, 247–250.
  9. [9] T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, & T.C. Wu, Convertible multi-authenticated encryption scheme, Information Science, 178, 2008, 256–263.
  10. [10] Y. Desmedt & Y. Frankel, Threshold cryptosystems,Advance in Cryptology – CRYPTO’89, LNCS 435, Springer-Verlag, 1989, 307–315.
  11. [11] T.P. Pedersen, A threshold cryptosystem without a trusted party, Advances in Cryptology – EUROCRYPT’91, LNCS 547, Springer-Verlag, 1991, 522–526.
  12. [12] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, 48, 1987, 203–209.
  13. [13] Y.F. Chung, K.H. Huang, & T.S. Chen, Threshold authenticated encryption scheme using labor-division signature, Computer Standards & Interfaces, 31(2), 2009, 300–304.
  14. [14] C.C. Lin & C.S. Laih, Cryptanalysis of Nyberg–Rueppel’s message recovery scheme, IEEE Communication Letters, 4(7), 2000, 231–232.
  15. [15] C.M. Li, T. Hwang & N.Y. Lee, Remark on the threshold RSA signature scheme, Advances in Cryptology — CRYPTO’93, LNCS 773, Springer-Verlag, 1993, 413–420.
  16. [16] A. Shamir, How to share a secret, Communications of the ACM, 1979, 612–613.

Important Links:

Go Back