http://scholars.ntou.edu.tw/handle/123456789/5848| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Han-Yu Lin | en_US |
| dc.date.accessioned | 2020-11-19T11:15:37Z | - |
| dc.date.available | 2020-11-19T11:15:37Z | - |
| dc.date.issued | 2019-05 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/5848 | - |
| dc.description.abstract | The Traditional Authenticated Encryption (AE) scheme is a single-user cryptographic mechanism which only enables one designated verifier to authenticate the ciphertext. Although several group-oriented AE variants have also been proposed to eliminate such a limitation, they require shared verification. This motivated us to think of a scenario of three-party communication environments where each party runs independent processes without cooperation. In this paper, we realize a novel three-party AE (abbreviated to TPAE) scheme in which two designated verifiers can solely decrypt the same ciphertext and then inspect the validity of embedded signature. Additionally, we also show that our TPAE construction is computationally secure using the well-defined IND-CCA2 and the EF-CMA adversary games in the proof model of random oracles. The comparison results will demonstrate the computational efficiency of our mechanism. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | MDPI | en_US |
| dc.relation.ispartof | Symmetry-Basel | en_US |
| dc.subject | authenticated encryption | en_US |
| dc.subject | digital signature | en_US |
| dc.subject | three-party | en_US |
| dc.subject | bilinear pairings | en_US |
| dc.subject | shared secret | en_US |
| dc.title | A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets | en_US |
| dc.type | journal article | en_US |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | 10.3390/sym11050605 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.url | <Go to ISI>://WOS:000470990900008 | |
| dc.relation.journalvolume | 11 | en_US |
| dc.relation.journalissue | 5 | en_US |
| dc.relation.pages | 605 | en_US |
| item.fulltext | no fulltext | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
| item.cerifentitytype | Publications | - |
| item.grantfulltext | none | - |
| item.languageiso639-1 | en | - |
| item.openairetype | journal article | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| Appears in Collections: | 資訊工程學系 | |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.