{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:55:57Z","timestamp":1762210557269},"reference-count":17,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2009,4]]},"abstract":"<jats:p> A convertible authenticated encryption scheme allows a designated receiver to retrieve an authenticated ciphertext and convert the authenticated ciphertext into an ordinary signature. The receiver can prove the dishonesty of the sender to anyone if the sender repudiates his\/her signature. Recently, many researchers have proposed convertible authenticated encryption schemes based on cryptological algorithms. In this paper, the authors shall present a new convertible authenticated encryption scheme based on the ElGamal cryptosystem. The proposed scheme is more efficient than Wu-Hsu's scheme in terms of computational complexity. <\/jats:p>","DOI":"10.1142\/s0129054109006607","type":"journal-article","created":{"date-parts":[[2009,4,7]],"date-time":"2009-04-07T08:25:36Z","timestamp":1239092736000},"page":"351-359","source":"Crossref","is-referenced-by-count":13,"title":["A NEW CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME BASED ON THE ELGAMAL CRYPTOSYSTEM"],"prefix":"10.1142","volume":"20","author":[{"given":"CHENG-CHI","family":"LEE","sequence":"first","affiliation":[{"name":"Department of Information &amp; Communication Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, Taichung, Taiwan, R.O.C."}]},{"given":"MIN-SHIANG","family":"HWANG","sequence":"additional","affiliation":[{"name":"Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan, R.O.C."}]},{"given":"SHIANG-FENG","family":"TZENG","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C."}]}],"member":"219","published-online":{"date-parts":[[2012,4,30]]},"reference":[{"key":"rf1","first-page":"63","volume":"82","author":"Araki Shunsuke","journal-title":"IEICE Transactions on Fundamentals"},{"key":"rf2","first-page":"1","volume":"14","author":"Chien H. Y.","journal-title":"Informatica"},{"key":"rf3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"ElGamal T.","journal-title":"IEEE Transactions on Information Theory"},{"key":"rf4","first-page":"157","volume":"2","author":"Hernandez Encinas L.","journal-title":"International Journal of Network Security"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1049\/el:19940856"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1109\/69.991728"},{"key":"rf7","first-page":"61","volume":"1","author":"Hwang Min-Shiang","journal-title":"International Journal of Network Security"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(96)00032-4"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1049\/el:19951167"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(97)00118-X"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.10.057"},{"key":"rf14","first-page":"61","volume":"7","author":"Nyberg K.","journal-title":"Designs, Codes and Cryptography"},{"key":"rf15","first-page":"80","volume":"6","author":"Sramka Michal","journal-title":"International Journal of Network Security"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2006.02.005"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.06.011"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00143-1"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.11.010"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054109006607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T12:40:32Z","timestamp":1565095232000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054109006607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":17,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2012,4,30]]},"published-print":{"date-parts":[[2009,4]]}},"alternative-id":["10.1142\/S0129054109006607"],"URL":"https:\/\/doi.org\/10.1142\/s0129054109006607","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4]]}}}