-analysis of an authenticated encryption scheme usingself-certified public keys,” Applied authenticated en-cryption scheme by using self-certified public keys. Basedon this scheme several
, “Practical convertible authenticated encryption schemes using self-certified public keys , “Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using
, “Threshold signaturescheme using self-certified public keys,” Journal ofSystem and Software, vol Efficient Proxy Blind Signature SchemeUsing Verifiable Self-certified Public KeyJiguo Li1 and
. Yoo, “An improved digital signature with message recovery using self-certified public keys message recovery using self-certified public keys and its variants,” Applied Mathematics and
Hsu [64] proposeda threshold signature scheme using self-certified publickeys. Unlike the designated members’ public keys.In fact, three schemes belong to authenticated encryptionscheme
multi-server 5G networks using self-certified public key cryptography”, Journal of Network blockchain architecture. Using an improved cryptography system, the public key encryption and
sign-cryption scheme using self-certified public keys,” In-ternational Journal of . A. B. Shirazi, “Cryptanalysis ofan elliptic curve-based signcryption scheme,” Inter
authentication scheme using self-certifiedpublic keys for mobile clients,” Future GenerationComputer -certified public keys for mobile clients.Liu et al. [15]have investigated the problem of
, no. 4,pp. 469–472, 1985.[7] M. Girault, “Self-certified public keys,” Advances in [8], Identity-based public key systems [15] and Self-certified public keysystems [7
is an integration of hash function and symmetric encryption scheme. Thedefinition of the Symmetric Encryption SchemeA symmetric encryption scheme Γ consists of two algorithms {E, D}.20
為了持續優化網站功能與使用者體驗,本網站將Cookies分析技術用於網站營運、分析和個人化服務之目的。
若您繼續瀏覽本網站,即表示您同意本網站使用Cookies。