Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

A new authenticated encryption schemes without using Hash and Redundancy functions

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Fangwei Li ; Key Lab. of Mobile Commun. Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China ; Xun Sun ; Xin Zhang ; Li Wan
more authors

A new type of authenticated encryption schemes combined signature with message recovery schemes and symmetric encryption schemes together. It was an authenticated encryption without using Hash functions or Redundancy functions. However, we found the scheme does not have a digital signature of the basic conditions required, and can not resist the forgery attack of the news recipient, At the same time, we proposed a new authenticated encryption schemes, the security of new scheme is based on solving the discrete logarithm problem and the dual-mode problem, and whenever a dispute arises, the authenticated encryption signature will be converted into an ordinary signature, anyone can verify the validity of signatures.

Published in:

Industrial Mechatronics and Automation (ICIMA), 2010 2nd International Conference on  (Volume:1 )

Date of Conference:

30-31 May 2010