On the Connection Between Signcryption and One-Pass Key Establishment

نویسندگان

  • M. Choudary Gorantla
  • Colin Boyd
  • Juan Manuel González Nieto
چکیده

Key establishment between two parties that uses only one message transmission is referred to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient constructions, even though they will typically provide a lower level of security than the corresponding multi-pass variants. In this paper, we explore the intuitive connection between signcryption and OPKE. By establishing a formal relationship between these two primitives, we show that with appropriate security notions, OPKE can be used as a signcryption KEM and vice versa. In order to establish the connection we explore the definitions of security for signcryption (KEM) and give new and generalised definitions. By making our generic constructions concrete we are able to provide new examples of signcryption KEMs and an OPKE protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices

Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...

متن کامل

| Draft | Using Signcryption to Build Compact and Eecient Protocols for Unforgeable Session Key Establishment

Authenticated session key establishment is a central issue in network security. With the rapid deployment of the information superhighway which uses ATM or Asyn-chronous Transfer Mode for data transmission, compactness and eeciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol. This paper addresses a question on whether we can ...

متن کامل

Using Signcryption to Build Compact and Eecient Protocols for Unforgeable Session Key Establishment

Authenticated session key establishment is a central issue in network security. With the rapid deployment of the information superhighway which uses ATM or Asyn-chronous Transfer Mode for data transmission, compactness and eeciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol. This paper addresses a question on whether we can ...

متن کامل

Using Signcryption to Build Compact and E cient Protocols for Unforgeable Session Key Establishment

Authenticated session key establishment is a central issue in network security With the rapid deployment of the information superhighway which uses ATM or Asyn chronous Transfer Mode for data transmission compactness and e ciency have emerged as critical factors that have to be taken into account in the design of a key establishment protocol This paper addresses a question on whether we can des...

متن کامل

Compact and Unforgeable Key Establishment over an ATM Network

Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key establishment protocol that has the following two properties: (1) each message exchanged between two participants can be transferred in a short packet such as an ATM cell whose payload has only 384 bits, and (2) messa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007