Cited By
View all- Xhafa FChen XHuang XKolici V(2014)Advances in secure and intelligent data processingConcurrency and Computation: Practice & Experience10.1002/cpe.306626:5(1021-1022)Online publication date: 10-Apr-2014
By integrating self-certified public-key systems and the designated verifier proxy signature with message recovery, Wu and Lin proposed the first self-certified proxy convertible authenticated encryption (SP-CAE) scheme and its variants based on ...
Elaborating on the merits of proxy signature schemes and convertible authenticated encryption (CAE) schemes, we adopt self-certified public key systems to construct efficient proxy CAE schemes enabling an authorized proxy signer to generate an ...
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated ...
John Wiley and Sons Ltd.
United Kingdom