7,850 Hits in 4.0 sec

A threshold authenticated encryption scheme using hybrid problems

M. S. A. Mohamad, E. S. Ismail
2014 Applied Mathematical Sciences  
In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.  ...  We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message.  ...  We also thank to Mrs Alena Sanusi for her comments and constructive suggestions on the manuscript.  ... 
doi:10.12988/ams.2014.4142 fatcat:z4i4eeoldzhedl7e7gk4awxvqa

Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem [chapter]

Rui Zhang, Hideki Imai
2003 Lecture Notes in Computer Science  
They further improved the result resisting an erasure-free adversary for signature schemes and encryption scheme [17], in which (1) an adversary corrupts servers at any point of the protocol depending  ...  Fouque and Stern made the first attempt towards the one round distributed key generation [11]: A non-interactive proof of verifiable encryption discrete logarithm is attached to the shares encrypted by  ...  However, to emphasize the efficiency of practical use, we construct a verifiable encryption of discrete logarithm over any homomorphic encryption schemes.  ... 
doi:10.1007/978-3-540-45203-4_8 fatcat:45er6ymncfhizo4ym7u2qwtebe

A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms

Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, Min-Shiang Hwang
2017 International Journal of Network Security  
In this article, we propose a publicly verifiable authenticated encryption scheme based on factoring and discrete logarithms.  ...  We point out that even if either factoring or discrete logarithms is broken, this scheme still could keep the authentication, integration, and confidentiality of the message.  ...  The proposed scheme is a publicly verifiable authenticated encryption scheme based on factoring and discrete logarithms.  ... 
dblp:journals/ijnsec/TsaiLTH17 fatcat:s35345ih6fdmnlplzbcncq7lby

Efficient and General PVSS Based on ElGamal Encryption

Kun Peng
2012 Journal of Information Processing Systems  
Finally, an encryption-improving technique is proposed to achieve very high efficiency in the new PVSS scheme.  ...  The other requires that the dealer must know the discrete logarithm of the secret to share and thus weakens the generality and it cannot be employed in many applications.  ...  So knowledge of a discrete logarithm of the secret is compulsory to the dealer in the PVSS scheme in [10] . Therefore, it is not suitable for some applications.  ... 
doi:10.3745/jips.2012.8.2.375 fatcat:nolgrdpqgvcjbkksp62xqnbkxu

Multi-Authority Secret-Ballot Elections with Linear Work [chapter]

Ronald Cramer, Matthew Franklin, Berry Schoenmakers, Moti Yung
1996 Lecture Notes in Computer Science  
Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damgård and Schoenmakers, and the verifiable secret sharing scheme of Pedersen  ...  , reduce the work required by the voter or an authority to a linear number of cryptographic operations in the population size (compared to quadratic in previous schemes).  ...  Each family G for which it is reasonable to assume the intractability of the discrete logarithm problem is suitable for our purpose of constructing efficient and secure homomorphic encryption schemes with  ... 
doi:10.1007/3-540-68339-9_7 fatcat:bnzqh6ltkreubfgxutnrtj6r4q

Efficient verifiable encryption (and fair exchange) of digital signatures

Giuseppe Ateniese
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
This paper presents new simple schemes for verifiable encryption of digital signatures.  ...  The performance of our schemes significantly surpasses that of prior art.  ...  Acknowledgments We are grateful to Victor Shoup for illuminating discussions concerning the topic of this paper.  ... 
doi:10.1145/319709.319728 dblp:conf/ccs/Ateniese99 fatcat:zr4omvpqz5c4hgwiw3b5wup5xy

A Secure and Efficient Key Escrow Protocol for Mobile Communications [chapter]

Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim
2001 Lecture Notes in Computer Science  
key for end-to-end encryption.  ...  In this paper we present secure and efficient key escrow protocols that guarantees escrow secrecy, public verifiability, and robustness for mobile telecommunications systems.  ...  First, each TTP randomly chooses a secret key Z q z and publishes his public- By the discrete logarithm of ( ) g y to the base g , we can now immediately obtain an efficient proof of knowledge for the  ... 
doi:10.1007/3-540-45545-0_52 fatcat:e4t5ghwltfgd7cor3xw2hdqf6q

Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation

Ramratan Ahirwal, Anjali Jain, Y. K. Jain
2013 International Journal of Computer Applications  
Main benefit of the proposed scheme is that it uses only elliptic curve for both encryption and signature generation.  ...  The aim of this paper is to specify signcryption schemes on elliptic curves over finite fields, and to examine the efficiency of such schemes.  ...  Because signcryption scheme provides both the functions of encryption and signature in a single logical step.5.3 Discrete Logarithm Signcryption versus sign-then encrypt : Computational complexity of different  ... 
doi:10.5120/10112-4777 fatcat:pxaiwbzfajak3hqc54m4n6gq6m

The Beta Cryptosystem

Chandrashekhar Meshram
2015 Bulletin of Electrical Engineering and Informatics  
We next show that, the newly developed scheme is efficient with respect to encryption and decryption and the validity of this algorithm is proven by applying to message that are text and returning the  ...  Therefore, this scheme is expected to gain a higher level of security.  ...  The security of the new scheme is based on discrete logarithm problem.  ... 
doi:10.11591/eei.v4i2.442 fatcat:jgxamx4iabevbpzbpzlybbp4fe

Publicly Verifiable Secret Sharing [chapter]

Markus Stadler
1996 Lecture Notes in Computer Science  
A secret sharing scheme allows to share a secret among several participants such that only certain groups of them can recover it.  ...  We will call such schemes publicly verifiable secret sharing schemes, we discuss new applications t o w : m w cryptosystems and t o payment systems with revocablc anonymity, and we present two new realizations  ...  Canienisch, and the anonymous referees for their useful comments.  ... 
doi:10.1007/3-540-68339-9_17 fatcat:tm3bfa6f7fe5hby37eo4vvkxvy

A New Cryptosystem Based on Factoring and Discrete Logarithm Problems

2011 Journal of Mathematics and Statistics  
The efficiency performance of our scheme only requires 3T exp +T mul + T hash time complexity for encryption and 2T exp + T mul time complexity for decryption and this magnitude of complexity is considered  ...  Currently the existing cryptosystems were developed based on a single hard problem like factoring, discrete logarithm, residuosity, knapsack or elliptic curve discrete logarithm.  ...  For efficiency performance, we evaluate the time complexity for both phases; encryption and decryption and also the communication cost for our scheme.  ... 
doi:10.3844/jmssp.2011.165.168 fatcat:q2ffvdnhvrfe7iw5euoi6cr4ra

An ID-Based Group Key Agreement Scheme for Controlling Access and Privacy in Cloud

Jen-Ho Yang, Iuon-Chang Lin, Po-Ching Chien
2018 International Journal of Computer and Communication Engineering  
For achieving the access control and the privacy of data, the data owner can determine who can decrypt the encrypted data.  ...  As the population of cloud service, more and more people concerns the privacy and security of cloud service. Therefore, an ID-based group key agreement scheme is proposed.  ...  Discrete Logarithm Problem (DLP): For Y nX  , and * q nZ  . Given 1 , X Y G  to compute n . It is discrete logarithm problem.  ... 
doi:10.17706/ijcce.2018.7.1.1-7 fatcat:t3pvklm5tjaylma4wwu3uitu2i

Authenticated Encryption Schemes: Current Status and Key Issues

Min-Shiang Hwang, Chi-Yu Liu
2005 International Journal of Network Security  
The scheme is very suitable for the key agreement application, because a key is a small amount of a message.  ...  In order to comprehend and interpret the authenticated encryption schemes overall, we discuss the evolution and the existed problems of authenticated encryption schemes.  ...  All of above basic authenticated encryption schemes are based on discrete logarithm.  ... 
dblp:journals/ijnsec/HwangL05a fatcat:xz6wihofxvcwbbnwl5rbhhdbqy

A Review of Elliptic Curve based Signcryption Schemes

Anuj KumarSingh
2014 International Journal of Computer Applications  
Also, the elliptic curve based signcryption schemes are suitable for resource constrained applications.  ...  Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-thenencryption approach.  ...  Signcryption schemes can be based on Discrete Logarithmic Problem (DLP) or Elliptic Curve Discrete Logarithmic Problem (ECDLP).  ... 
doi:10.5120/17821-8769 fatcat:eentzg7llzaixjpqykgl7pvgjy

An Efficient Certificate-based Verifiable Encrypted Signature Scheme Without Pairings

Rufen Huang, Qiang Nong
2015 Open Cybernetics and Systemics Journal  
A CB-PKS scheme is a compromise between IB-PKS and PKS. It consists of a certifier and users, each user generates his own An Efficient Certificate-based Verifiable Encrypted Signature Scheme The Open  ...  We incorporate the verifiable encrypted signature into the certificate-based signature to propose an efficient certificate-based verifiable encrypted signature scheme in the paper, which does not require  ...  ACKNOWLEDGEMENTS The authors thank the anonymous referees and reviewers for their very valuable comments on this paper. This work is supported by Natural Science Foundation of China (No.  ... 
doi:10.2174/1874110x01408010239 fatcat:3evvfxeuh5ekbeyfwdflfbys3e
« Previous Showing results 1 — 15 out of 7,850 results