Chapter

Cryptography and Coding

Volume 4887 of the series Lecture Notes in Computer Science pp 277-301

On the Connection Between Signcryption and One-Pass Key Establishment

  • M. Choudary GorantlaAffiliated withInformation Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001
  • , Colin BoydAffiliated withInformation Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001
  • , Juan Manuel González NietoAffiliated withInformation Security Institute, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001

* Final gross prices may vary according to local VAT.

Get Access

Abstract

There is an intuitive connection between signcryption and one-pass key establishment. Although this has been observed previously, up to now there has been no formal analysis of this relationship. The main purpose of this paper is to prove that, with appropriate security notions, one-pass key establishment can be used as a signcryption KEM and vice versa. In order to establish the connection we explore the definitions for signcryption (KEM) and give new and generalised definitions. By making our generic construction concrete we are able to provide new examples of a signcryption KEM and a one-pass key establishment protocol.

Keywords

Key establishment Signcryption Signcryption KEM