A threshold authenticated encryption scheme using hybrid problems
In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Secur...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hikari Ltd
2014
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/19417/1/AMS%208%2031%202014%201499-1507.pdf |
_version_ | 1825804198865797120 |
---|---|
author | Mohamad, Mohd Saiful Adli Ismail, E. S. |
author_facet | Mohamad, Mohd Saiful Adli Ismail, E. S. |
author_sort | Mohamad, Mohd Saiful Adli |
collection | UUM |
description | In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold
cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Security analysis shows that our scheme will remain secure even if one of these problems can be solved. |
first_indexed | 2024-07-04T06:10:32Z |
format | Article |
id | uum-19417 |
institution | Universiti Utara Malaysia |
language | English |
last_indexed | 2024-07-04T06:10:32Z |
publishDate | 2014 |
publisher | Hikari Ltd |
record_format | eprints |
spelling | uum-194172016-11-14T04:50:22Z https://repo.uum.edu.my/id/eprint/19417/ A threshold authenticated encryption scheme using hybrid problems Mohamad, Mohd Saiful Adli Ismail, E. S. QA75 Electronic computers. Computer science In this paper, we propose a threshold authenticated encryption scheme using both factoring and discrete logarithm problems.We apply the concept of threshold cryptography in the verification and message recovery phase, where t out of n recipients are required to verify and recover the message. Security analysis shows that our scheme will remain secure even if one of these problems can be solved. Hikari Ltd 2014 Article PeerReviewed application/pdf en cc_by https://repo.uum.edu.my/id/eprint/19417/1/AMS%208%2031%202014%201499-1507.pdf Mohamad, Mohd Saiful Adli and Ismail, E. S. (2014) A threshold authenticated encryption scheme using hybrid problems. Applied Mathematical Sciences, 8. pp. 1499-1507. ISSN 1314-7552 http://doi.org/10.12988/ams.2014.4142 doi:10.12988/ams.2014.4142 doi:10.12988/ams.2014.4142 |
spellingShingle | QA75 Electronic computers. Computer science Mohamad, Mohd Saiful Adli Ismail, E. S. A threshold authenticated encryption scheme using hybrid problems |
title | A threshold authenticated encryption scheme using hybrid problems |
title_full | A threshold authenticated encryption scheme using hybrid problems |
title_fullStr | A threshold authenticated encryption scheme using hybrid problems |
title_full_unstemmed | A threshold authenticated encryption scheme using hybrid problems |
title_short | A threshold authenticated encryption scheme using hybrid problems |
title_sort | threshold authenticated encryption scheme using hybrid problems |
topic | QA75 Electronic computers. Computer science |
url | https://repo.uum.edu.my/id/eprint/19417/1/AMS%208%2031%202014%201499-1507.pdf |
work_keys_str_mv | AT mohamadmohdsaifuladli athresholdauthenticatedencryptionschemeusinghybridproblems AT ismailes athresholdauthenticatedencryptionschemeusinghybridproblems AT mohamadmohdsaifuladli thresholdauthenticatedencryptionschemeusinghybridproblems AT ismailes thresholdauthenticatedencryptionschemeusinghybridproblems |