The ring authenticated encryption scheme – How to provide a clue wisely

Cited 0 time in webofscience Cited 6 time in scopus
  • Hit : 579
  • Download : 110
DC FieldValueLanguage
dc.contributor.authorLv, Jiqiang-
dc.contributor.authorRen, Kui-
dc.contributor.authorChen, Xiaofeng-
dc.contributor.authorKim, Kwangjo-
dc.date.accessioned2011-07-06T06:49:29Z-
dc.date.available2011-07-06T06:49:29Z-
dc.date.issued2009-
dc.identifier.citationInformation Sciences, Vol.179, pp.161-168en
dc.identifier.issn0020-0255-
dc.identifier.urihttp://hdl.handle.net/10203/24466-
dc.description.abstractThough cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely.en
dc.description.sponsorshipThe authors thank the anonymous referees for their helpful comments. The third author as well as his work is supported by National Natural Science Foundation of China (No. 60503006).en
dc.language.isoen_USen
dc.publisherElsevieren
dc.subjectPublic key cryptologyen
dc.subjectRing signatureen
dc.subjectAuthenticated encryption schemeen
dc.titleThe ring authenticated encryption scheme – How to provide a clue wiselyen
dc.typeArticleen
dc.identifier.doi10.1016/j.ins.2008.09.014-
Appears in Collection
CS-Journal Papers(저널논문)

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0