International Conference on the Theory and Application of Cryptology and Information Security

ASIACRYPT 2011: Advances in Cryptology – ASIACRYPT 2011 pp 161-178

On the Joint Security of Encryption and Signature, Revisited

  • Kenneth G. Paterson
  • Jacob C. N. Schuldt
  • Martijn Stam
  • Susan Thomson
Conference paper

DOI: 10.1007/978-3-642-25385-0_9

Volume 7073 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Paterson K.G., Schuldt J.C.N., Stam M., Thomson S. (2011) On the Joint Security of Encryption and Signature, Revisited. In: Lee D.H., Wang X. (eds) Advances in Cryptology – ASIACRYPT 2011. ASIACRYPT 2011. Lecture Notes in Computer Science, vol 7073. Springer, Berlin, Heidelberg

Abstract

We revisit the topic of joint security for combined public key schemes, wherein a single keypair is used for both encryption and signature primitives in a secure manner. While breaking the principle of key separation, such schemes have attractive properties and are sometimes used in practice. We give a general construction for a combined public key scheme having joint security that uses IBE as a component and that works in the standard model. We provide a more efficient direct construction, also in the standard model.

Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Kenneth G. Paterson
    • 1
  • Jacob C. N. Schuldt
    • 2
  • Martijn Stam
    • 3
  • Susan Thomson
    • 1
  1. 1.Royal Holloway, University of LondonUK
  2. 2.Research Center for Information Security, AISTJapan
  3. 3.University of BristolUK