A high-performance authentication-encryption scheme
DOI:
https://doi.org/10.56651/lqdtu.jst.v11.n01.360.ictKeywords:
Symmetric key cryptography, public key cryptography, encryption – authentication, hash function, discrete logarithmAbstract
This paper proposes an encryption scheme that enables verifying the source and integrity of the encrypted message. Additionally, the proposed scheme generates a secret key which is shared between the sender/encryptor and the receiver/decryptor for each encrypted message using public key cryptography.