Ci-Lin Li

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Recently, Chung et al. (2009) proposed a novel and valuable threshold authenticated encryption scheme. Unfortunately, it has a potential weakness: if the secret message involves criminal evidence or illegal content, the designated receiver cannot authenticate the secret message in the later dispute. The authors of this paper aim at enhancing Chung et al.'s(More)
  • 1