完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chang, TY | en_US |
dc.contributor.author | Yang, CC | en_US |
dc.contributor.author | Hwang, MS | en_US |
dc.date.accessioned | 2014-12-08T15:38:59Z | - |
dc.date.available | 2014-12-08T15:38:59Z | - |
dc.date.issued | 2004-06-01 | en_US |
dc.identifier.issn | 0916-8508 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26684 | - |
dc.description.abstract | Recently, Ma and Chen proposed a new authenticated encryption scheme with public verifiability. The signer can generate a signature with message recovery for a specified recipient. With a dispute, the recipient has ability to convert the signature into an ordinary one that can be verified by anyone without divulging her/his private key and the message. However, we point out that any adversary can forge a converted signature in this article. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | authenticated encryption scheme | en_US |
dc.subject | discrete logarithms | en_US |
dc.subject | signcryption | en_US |
dc.title | Cryptanalysis of publicly verifiable authenticated encryption | en_US |
dc.type | Letter | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | en_US |
dc.citation.volume | E87A | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 1645 | en_US |
dc.citation.epage | 1646 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000221983900052 | - |
dc.citation.woscount | 3 | - |
顯示於類別: | 期刊論文 |