ID-based authenticated encryption scheme with public verifiability

Sheng Guo, Zhenfu Cao, Rongxing Lu

Research output: Contribution to journalArticlepeer-review

Abstract

A new efficient ID-based authenticated encryption scheme is proposed, in which some characteristics of bilinear map are used. As the authentication and recovery are separated in this scheme, anyone can identify the source of the ciphertext, but only the receiver can recover the plaintext. What's more, the proposed scheme is also very efficient regarding to the computation costs and the communication overheads.

Original languageEnglish
Pages (from-to)125-126+194
JournalJisuanji Gongcheng/Computer Engineering
Volume32
Issue number18
StatePublished - 20 Sep 2006
Externally publishedYes

Keywords

  • Authenticated encryption
  • Bilinear map
  • ID-based
  • Public verifiability

Fingerprint

Dive into the research topics of 'ID-based authenticated encryption scheme with public verifiability'. Together they form a unique fingerprint.

Cite this