Hybrid Cryptography

نویسنده

  • Alexander W. Dent
چکیده

This paper considers the idea that other schemes besides asymmetric encryption schemes can benefit from a formalisation of the principles of hybrid cryptography. The main focus of research in hybrid cryptography has been in producing efficient asymmetric encryption schemes. Not only have several schemes been proposed, but also a generic method of constructing hybrid encryption schemes from lowerlevel primitives with independent security criteria. There has also been some work on producing hybrid signcryption schemes, but, so far, no independent generic construction paradigms have been proposed for the signcryption setting. We review the generic KEM–DEM construction for a hybrid encryption scheme, as proposed by Cramer and Shoup [18, 37], and consider the problems associated with extending the ideas behind the KEM–DEM construction to digital signature schemes and signcryption schemes. This paper shows that it is possible to construct very simple hybrid signcryption schemes with outsider security, in a manner similar to the generic construction for a hybrid encryption scheme. However we have to extend the construction significantly in order to propose a generic hybrid construction for a signcryption scheme with insider security. In passing, we note that it is not possible to construct efficient hybrid signature schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid encryption/decryption technique using new public key and symmetric key algorithm

This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy....

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Post-Quantum Secure Hybrid Signcryption from Lattice Assumption

Motivated by the demand to have secure signcryption scheme, even in quantum era, the concept of signcryption tag-KEM (key encapsulation machine) is extended to lattice cryptography in this paper. A lattice-based hybrid signcryption scheme is proposed by building a lattice-based signcryption tag-KEM. Based on the hardness of the learning with errors problem and the short integer solution problem...

متن کامل

Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security

The hybrid signcryption scheme based on certificateless public key cryptography avoids the complexity of certificate management existing in the traditional public key cryptography and the inherent key escrow problem existing in identity-based public key cryptography. The certificateless hybrid signcryption scheme combined with certificateless signcryption key encapsulation mechanism and data en...

متن کامل

Hybrid Signcryption Schemes with Insider Security ( Extended Abstract )

The question of constructing a hybrid signcryption scheme with outside security was considered by Dent [7]. That paper also demonstrated that the basic hybrid construction formalised by Cramer and Shoup [5, 9] is incapable of producing a signcryption scheme with insider security. This paper provides a paradigm for constructing signcryption schemes with insider security based on the ideas of hyb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004