Advertisement

Security for Signcryption: The Two-User Model

  • Jee Hea An
  • Tal RabinEmail author
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

Signcryption is a cryptographic primitive designed to simultaneously provide confidentiality and integrity protection in a communication (see  Chap. 1 for a more detailed description of the role of signcryption in a communication architecture ). It is a public-key primitive and can be viewed as the public-key version of the symmetric-key primitive known as authenticated encryption ; indeed, the two primitives share many similarities at a high level.

References

  1. 7.
    J. H. An. Authenticated encryption in the public-key setting: Security notions and analyses. Available from http://eprint.iacr.org/2001/079, 2001.
  2. 9.
    J. H. An and M. Bellare. Does encryption with redundancy provide authenticity? In B. Pfitzmann, editor, Advances in Cryptology – Eurocrypt 2001, volume 2045 of Lecture Notes in Computer Science, pages 512–528. Springer, 2001.Google Scholar
  3. 10.
    J. H. An, Y. Dodis, and T. Rabin. On the security of joint signatures and encryption. In L. Knudsen, editor, Advances in Cryptology – Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83–107. Springer, 2002.Google Scholar
  4. 26.
    M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Okamoto, editor, Advances in Cryptology – Asiacrypt 2000, volume 1976 of Lecture Notes in Computer Science, pages 531–545. Springer, 2000.Google Scholar
  5. 58.
    D. Chaum and H. van Antwerpen. Undeniable signatures. In G. Brassard, editor, Advances in Cryptology – Crypto ’89, volume 435 of Lecture Notes in Computer Science, pages 212–216. Springer, 1989.Google Scholar
  6. 73.
    A. W. Dent. Hybrid signcryption schemes with outsider security (extended abstract). In J. Zhou and J. Lopez, editors, Proceedings of the 8th International Conference on Information Security – ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 203–217. Springer, 2005.Google Scholar
  7. 117.
    H. Krawczyk. The order of encryption and authentication for protecting communications (or: How secure is SSL?). In J. Kilian, editor, Advances in Cryptology – Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 310–331. Springer, 2001.Google Scholar
  8. 119.
    H. Krawczyk and T. Rabin. Chameleon signatures. In Proceedings of the Network and Distributed Systems Symposium – NDSS 2000, pages 143–154. 2000.Google Scholar
  9. 184.
    R. Steinfeld and Y. Zheng. A signcryption scheme based on integer factorization. In J. Pieprzyk, E. Okamoto, and J. Seberry, editors, Information Security Workshop (ISW 2000), volume 1975 of Lecture Notes in Computer Science, pages 308–322. Springer, 2000.Google Scholar
  10. 203.
    Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) « cost (signature) + cost(encryption). In B. S. Kaliski Jr., editor, Advances in Cryptology – Crypto ’97, volume 1294 of Lecture Notes in Computer Science, pages 165–179. Springer, 1997.Google Scholar
  11. 204.
    Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) « cost (signature) + cost(encryption). Full version. Available from http://www.sis.uncc.edu/∼yzheng/papers/, 1997.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.San DiegoUSA
  2. 2.IBM T.J. Watson Research CenterHawthorneUSA

Personalised recommendations