Efficiency Improvements for Encrypt-to-Self
Abstract
References
Index Terms
- Efficiency Improvements for Encrypt-to-Self
Recommendations
Identity-based non-interactive key distribution with forward security
Identity-based non-interactive key distribution (ID-NIKD) is a cryptographic primitive that enables two users to establish a common secret key without exchanging messages. All users of the system have access to public system parameters and a private key,...
Forgery attacks on ++AE authenticated encryption mode
ACSW '16: Proceedings of the Australasian Computer Science Week MulticonferenceIn this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery ...
Provably secure encrypt-then-sign composition in hybrid signcryption
ICISC'02: Proceedings of the 5th international conference on Information security and cryptologyTo make authenticated encryption which provides confidentiality and authenticity of a message simultaneously, a signcryption scheme uses asymmetric primitives, such as an asymmetric encryption scheme for confidentiality and a signature scheme for ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Liqun Chen,
- Chris Mitchell,
- Program Chairs:
- Thanassis Giannetsos,
- Daniele Sgandurra
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 65Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in