http://scholars.ntou.edu.tw/handle/123456789/5848| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.author | Han-Yu Lin | en_US |
| dc.date.accessioned | 2020-11-19T11:15:37Z | - |
| dc.date.available | 2020-11-19T11:15:37Z | - |
| dc.date.issued | 2019-05 | - |
| dc.identifier.issn | 2073-8994 | - |
| dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/5848 | - |
| dc.description.abstract | The Traditional Authenticated Encryption (AE) scheme is a single-user cryptographic mechanism which only enables one designated verifier to authenticate the ciphertext. Although several group-oriented AE variants have also been proposed to eliminate such a limitation, they require shared verification. This motivated us to think of a scenario of three-party communication environments where each party runs independent processes without cooperation. In this paper, we realize a novel three-party AE (abbreviated to TPAE) scheme in which two designated verifiers can solely decrypt the same ciphertext and then inspect the validity of embedded signature. Additionally, we also show that our TPAE construction is computationally secure using the well-defined IND-CCA2 and the EF-CMA adversary games in the proof model of random oracles. The comparison results will demonstrate the computational efficiency of our mechanism. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | MDPI | en_US |
| dc.relation.ispartof | Symmetry-Basel | en_US |
| dc.subject | authenticated encryption | en_US |
| dc.subject | digital signature | en_US |
| dc.subject | three-party | en_US |
| dc.subject | bilinear pairings | en_US |
| dc.subject | shared secret | en_US |
| dc.title | A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets | en_US |
| dc.type | journal article | en_US |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | 10.3390/sym11050605 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.doi | <Go to ISI>://WOS:000470990900008 | - |
| dc.identifier.url | <Go to ISI>://WOS:000470990900008 | |
| dc.relation.journalvolume | 11 | en_US |
| dc.relation.journalissue | 5 | en_US |
| dc.relation.pages | 605 | en_US |
| item.fulltext | no fulltext | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
| item.cerifentitytype | Publications | - |
| item.grantfulltext | none | - |
| item.languageiso639-1 | en | - |
| item.openairetype | journal article | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| 顯示於: | 資訊工程學系 | |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。