TY - JOUR
T1 - The ring authenticated encryption scheme: How to provide a clue wisely
AU - Lu, J.
AU - Ren, K.
AU - Chen, Xiaofeng
AU - Kim, K.
PY - 2009
Y1 - 2009
N2 - Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely.
AB - Though cryptography is being used more and more widely in reality, it seems that there exists no scheme or a concatenation of some existing schemes that could deal soundly with such practical situations as providing a clue, where the provider of the clue may want to reserve his beneficial rights while keeping his identity secret. To address this problem, inspired by the two notions of the ring signature and the authenticated encryption signature, we propose a new type of authenticated encryption scheme, which we call the ring authenticated encryption scheme, which can enable any member of a group of persons to provide a clue to some designated recipient wisely.
U2 - 10.1016/j.ins.2008.09.014
DO - 10.1016/j.ins.2008.09.014
M3 - Article
SN - 0020-0255
VL - 179
SP - 161
EP - 168
JO - Information Sciences
JF - Information Sciences
IS - 1-2
ER -