On the Connection Between Signcryption and One-Pass Key Establishment
نویسندگان
چکیده
Key establishment between two parties that uses only one message transmission is referred to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient constructions, even though they will typically provide a lower level of security than the corresponding multi-pass variants. In this paper, we explore the intuitive connection between signcryption and OPKE. By establishing a formal relationship between these two primitives, we show that with appropriate security notions, OPKE can be used as a signcryption KEM and vice versa. In order to establish the connection we explore the definitions of security for signcryption (KEM) and give new and generalised definitions. By making our generic constructions concrete we are able to provide new examples of signcryption KEMs and an OPKE protocol.
منابع مشابه
Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices
Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...
متن کامل| Draft | Using Signcryption to Build Compact and Eecient Protocols for Unforgeable Session Key Establishment
Authenticated session key establishment is a central issue in network security. With the rapid deployment of the information superhighway which uses ATM or Asyn-chronous Transfer Mode for data transmission, compactness and eeciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol. This paper addresses a question on whether we can ...
متن کاملUsing Signcryption to Build Compact and Eecient Protocols for Unforgeable Session Key Establishment
Authenticated session key establishment is a central issue in network security. With the rapid deployment of the information superhighway which uses ATM or Asyn-chronous Transfer Mode for data transmission, compactness and eeciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol. This paper addresses a question on whether we can ...
متن کاملUsing Signcryption to Build Compact and E cient Protocols for Unforgeable Session Key Establishment
Authenticated session key establishment is a central issue in network security With the rapid deployment of the information superhighway which uses ATM or Asyn chronous Transfer Mode for data transmission compactness and e ciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol This paper addresses a question on whether we can des...
متن کاملCompact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key establishment protocol that has the following two properties: (1) each message exchanged between two participants can be transferred in a short packet such as an ATM cell whose payload has only 384 bits, and (2) messa...
متن کامل