Cited By
View all- Xhafa FChen XHuang XKolici V(2014)Advances in secure and intelligent data processingConcurrency and Computation: Practice & Experience10.1002/cpe.306626:5(1021-1022)Online publication date: 10-Apr-2014
By integrating self-certified public-key systems and the designated verifier proxy signature with message recovery, Wu and Lin proposed the first self-certified proxy convertible authenticated encryption (SP-CAE) scheme and its variants based on ...
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an ...
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated ...
John Wiley and Sons Ltd.
United Kingdom
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in