In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Security analysis shows that our scheme will remain secure even if one of these problems can be solved
Shamir proposed the concept of the ID-based Encryption (IBE) in [1]. Instead of generating and publi...
In an $\ell$ out of $n$ threshold scheme, $\ell$ out of $n$ members must cooperate to recover a secr...
Abstract—This paper presents a strong designated verifiable signcryption scheme, in which a message ...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
Digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital me...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
A hybrid cryptographic system providing digital authentication is described and analyzed in this pap...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
Shamir proposed the concept of the ID-based Encryption (IBE) in [1]. Instead of generating and publi...
In an $\ell$ out of $n$ threshold scheme, $\ell$ out of $n$ members must cooperate to recover a secr...
Abstract—This paper presents a strong designated verifiable signcryption scheme, in which a message ...
Abstract: Problem statement: A digital signature scheme allows one to sign an electronic message and...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
Digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital me...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
We present a new digital signature scheme with message recovery and its authenticated encryption bas...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and pu...
[[abstract]]In 2000, Wang et al. proposed a new (t, n) threshold signature scheme with (k, l) thresh...
A hybrid cryptographic system providing digital authentication is described and analyzed in this pap...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract: The problem called “constructing signature schemes for specified verifiers ” is proposed b...
We introduce in this paper a new identity-based threshold signature (IBTHS) technique, which is base...
Shamir proposed the concept of the ID-based Encryption (IBE) in [1]. Instead of generating and publi...
In an $\ell$ out of $n$ threshold scheme, $\ell$ out of $n$ members must cooperate to recover a secr...
Abstract—This paper presents a strong designated verifiable signcryption scheme, in which a message ...