An authenticated encryption scheme provides a mechanism of signing and encrypting simultaneously, and furthermore, the receiver can verify and decrypt the signature at the same time. Tseng et al. proposed two efficiently authenticated encryption schemes which can check the validity of the sent data before message recovery, but in fact their schemes cannot achieve completely the function. In this article, we point out the flaw and propose an improved scheme of revision.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Min-Shiang HWANG, Jung-Wen LO, Shu-Yin HSIAO, Yen-Ping CHU, "Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows" in IEICE TRANSACTIONS on Information,
vol. E89-D, no. 4, pp. 1575-1577, April 2006, doi: 10.1093/ietisy/e89-d.4.1575.
Abstract: An authenticated encryption scheme provides a mechanism of signing and encrypting simultaneously, and furthermore, the receiver can verify and decrypt the signature at the same time. Tseng et al. proposed two efficiently authenticated encryption schemes which can check the validity of the sent data before message recovery, but in fact their schemes cannot achieve completely the function. In this article, we point out the flaw and propose an improved scheme of revision.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e89-d.4.1575/_p
Copy
@ARTICLE{e89-d_4_1575,
author={Min-Shiang HWANG, Jung-Wen LO, Shu-Yin HSIAO, Yen-Ping CHU, },
journal={IEICE TRANSACTIONS on Information},
title={Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows},
year={2006},
volume={E89-D},
number={4},
pages={1575-1577},
abstract={An authenticated encryption scheme provides a mechanism of signing and encrypting simultaneously, and furthermore, the receiver can verify and decrypt the signature at the same time. Tseng et al. proposed two efficiently authenticated encryption schemes which can check the validity of the sent data before message recovery, but in fact their schemes cannot achieve completely the function. In this article, we point out the flaw and propose an improved scheme of revision.},
keywords={},
doi={10.1093/ietisy/e89-d.4.1575},
ISSN={1745-1361},
month={April},}
Copy
TY - JOUR
TI - Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows
T2 - IEICE TRANSACTIONS on Information
SP - 1575
EP - 1577
AU - Min-Shiang HWANG
AU - Jung-Wen LO
AU - Shu-Yin HSIAO
AU - Yen-Ping CHU
PY - 2006
DO - 10.1093/ietisy/e89-d.4.1575
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E89-D
IS - 4
JA - IEICE TRANSACTIONS on Information
Y1 - April 2006
AB - An authenticated encryption scheme provides a mechanism of signing and encrypting simultaneously, and furthermore, the receiver can verify and decrypt the signature at the same time. Tseng et al. proposed two efficiently authenticated encryption schemes which can check the validity of the sent data before message recovery, but in fact their schemes cannot achieve completely the function. In this article, we point out the flaw and propose an improved scheme of revision.
ER -