Digital signature with message recovery and authenticated encryption (signcryption) - A comparison

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Mitchell and Yeun [8] showed that Chen’s scheme [2] is not a digital signature scheme with message recovery, whereas it should be called an authenticated encryption scheme. Also note that similar remarks have been made in [10] regarding schemes recently proposed by Zheng. Thus we will show that there are major differences between a digital signature scheme with message recovery and authenticated encryption scheme by proposing a digital signature with message recovery scheme and signcryption scheme as an example for comparison. The security of the schemes is based on intractability of solving the Diffie Hellman problem as well as finding a collision on one-way hash-function.

Original languageBritish English
Title of host publicationCryptography and Coding - 7th IMA International Conference, Proceedings
EditorsMichael Walker
PublisherSpringer Verlag
Pages307-312
Number of pages6
ISBN (Print)354066887X, 9783540668879
StatePublished - 1999
Event7th IMA International Conference on Cryptography and Coding, 1999 - Cirencester, United Kingdom
Duration: 20 Dec 199922 Dec 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1746
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th IMA International Conference on Cryptography and Coding, 1999
Country/TerritoryUnited Kingdom
CityCirencester
Period20/12/9922/12/99

Fingerprint

Dive into the research topics of 'Digital signature with message recovery and authenticated encryption (signcryption) - A comparison'. Together they form a unique fingerprint.

Cite this