Hybrid Signcryption Schemes with Insider Security ( Extended Abstract )
نویسنده
چکیده
The question of constructing a hybrid signcryption scheme with outside security was considered by Dent [7]. That paper also demonstrated that the basic hybrid construction formalised by Cramer and Shoup [5, 9] is incapable of producing a signcryption scheme with insider security. This paper provides a paradigm for constructing signcryption schemes with insider security based on the ideas of hybrid cryptography.
منابع مشابه
Hybrid Cryptography
This paper considers the idea that other schemes besides asymmetric encryption schemes can benefit from a formalisation of the principles of hybrid cryptography. The main focus of research in hybrid cryptography has been in producing efficient asymmetric encryption schemes. Not only have several schemes been proposed, but also a generic method of constructing hybrid encryption schemes from lowe...
متن کاملBuilding Better Signcryption Schemes with Tag-KEMs
Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message. Recently, Dent [8, 9] and Bjørstad [4] investigated the possibility of constructing provably secure signcryption schemes using hybrid KEM-DEM techniques [7]. We build on this work by showing that more efficient insider secure hybrid signcryption schemes can be built using tag-KEMs [1]. ...
متن کاملImprovements and generalisations of signcryption schemes
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities of digital signatures and public-key encryption. We first propose two generic transforms from meta-ElGamal signature schemes to signcryption schemes. These constructions can be thought of as generalisations of the signcryption schemes by Zheng and Gamage et al. Our results show that a large clas...
متن کاملEfficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption th...
متن کاملCertificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
The hybrid signcryption scheme based on certificateless public key cryptography avoids the complexity of certificate management existing in the traditional public key cryptography and the inherent key escrow problem existing in identity-based public key cryptography. The certificateless hybrid signcryption scheme combined with certificateless signcryption key encapsulation mechanism and data en...
متن کامل