Zuowen Tan
[1] W. Diffie & M. Hellman, New directions in cryptography,Information Theory, IEEE Transactions, 22(6), 1976, 644–654. [2] Y. Zheng, Digital signcryption or how to achieve cost (signa-ture & encryption) << cost (signature) +cost (encryption),Advances in Cryptology-CRYPTO’97, LNCS 1296, Springer-Verlag, 1997, 165–179. [3] K. Nyberg & R.A. Rueppel, A new signature scheme basedon the DSA giving message recovery, Proc 1st ACM Conf. onComputer and Communications Security, Fairfax, VA, 1993,58–61. [4] K. Nyberg & R.A. Rueppel, Message recovery for signatureschemes based on the discrete logarithm, Advances in Cryp-tology – EUROCRYPT’94, LNCS 917, Springer-Verlag, 1994,175–190. [5] P. Horster, M. Michels, & H. Petersen, Authenticated en-cryption schemes with low communication costs, ElectronicsLetters, 30, 1994, 1212–1213. [6] W.B. Lee & C.C. Chang, Authenticated encryption schemewithout using a one way function, Electronics Letters, 31(19),1995, 1656–1657. [7] S.J. Hwang, C.C. Chang, & W.P. Yang, Authenticated encryp-tion schemes with message linkage, Information ProcessingLetters, 58, 1996, 189–194. [8] W.B. Lee & C.C. Chang, Authenticated encryption schemeswith linkage between message blocks, Information ProcessingLetters, 63, 1997, 247–250. [9] T.S. Wu, C.L. Hsu, K.Y. Tsai, H.Y. Lin, & T.C. Wu, Con-vertible multi-authenticated encryption scheme, InformationScience, 178, 2008, 256–263. [10] Y. Desmedt & Y. Frankel, Threshold cryptosystems,Advancein Cryptology – CRYPTO’89, LNCS 435, Springer-Verlag,1989, 307–315. [11] T.P. Pedersen, A threshold cryptosystem without a trustedparty, Advances in Cryptology – EUROCRYPT’91, LNCS 547,Springer-Verlag, 1991, 522–526. [12] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Com-putation, 48, 1987, 203–209. [13] Y.F. Chung, K.H. Huang, & T.S. Chen, Threshold authenti-cated encryption scheme using labor-division signature, Com-puter Standards & Interfaces, 31(2), 2009, 300–304. [14] C.C. Lin & C.S. Laih, Cryptanalysis of Nyberg–Rueppel’smessage recovery scheme, IEEE Communication Letters, 4(7),2000, 231–232. [15] C.M. Li, T. Hwang & N.Y. Lee, Remark on the threshold RSAsignature scheme, Advances in Cryptology — CRYPTO’93,LNCS 773, Springer-Verlag, 1993, 413–420. [16] A. Shamir, How to share a secret, Communications of theACM, 1979, 612–613.
Important Links:
Go Back