메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 491-507

Building better signcryption schemes with tag-KEMs

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 33745859311     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_32     Document Type: Conference Paper
Times cited : (35)

References (13)
  • 1
    • 24944516264 scopus 로고    scopus 로고
    • Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
    • Advances in Cryptology - EUROCRYPT 2005, Springer-Verlag
    • A. Abe, R. Gennaro, K. Kurosawa, and V. Shoup. Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In Advances in Cryptology - EUROCRYPT 2005, volume 3494 of Lecture Notes in Computer Science, pages 128-146. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 128-146
    • Abe, A.1    Gennaro, R.2    Kurosawa, K.3    Shoup, V.4
  • 2
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Advances in Cryptology - EUROCRYPT 2002, Springer-Verlag
    • J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Advances in Cryptology - EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 83-107. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Proceedings of PKC 2002, Springer-Verlag
    • J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In Proceedings of PKC 2002, volume 2274 of Lecture Notes in Computer Science, pages 80-98. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 4
    • 33745843355 scopus 로고    scopus 로고
    • Master's thesis, Norwegian University of Technology and Science
    • T. E. Bjørstad. Provable security of signcryption. Master's thesis, Norwegian University of Technology and Science, 2005. http://www.ii.uib.no/~tor/pdf/msc_thesis.pdf.
    • (2005) Provable Security of Signcryption
    • Bjørstad, T.E.1
  • 5
    • 33745123682 scopus 로고    scopus 로고
    • An efficient CDH-based signature scheme with a tight security reduction
    • Advances in Cryptology - CRYPTO 2005, Springer-Verlag
    • B. Chevallier-Mames. An efficient CDH-based signature scheme with a tight security reduction. In Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 511-526. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 511-526
    • Chevallier-Mames, B.1
  • 6
    • 33745832341 scopus 로고    scopus 로고
    • B. Chevallier-Mames. Personal correspondence, 2005
    • B. Chevallier-Mames. Personal correspondence, 2005.
  • 7
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2004.
    • (2004) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 8
    • 26444550015 scopus 로고    scopus 로고
    • Hybrid cryptography
    • A. W. Dent. Hybrid cryptography. Cryptology ePrint Archive, Report 2004/210, 2004. http://eprint.iacr.org/2004/210/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.210
    • Dent, A.W.1
  • 9
    • 26444544161 scopus 로고    scopus 로고
    • Hybrid signcryption schemes with insider security
    • Proceedings of ACISP 2005, Springer-Verlag
    • A. W. Dent. Hybrid signcryption schemes with insider security. In Proceedings of ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 253-266. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 253-266
    • Dent, A.W.1
  • 10
    • 33645962801 scopus 로고    scopus 로고
    • Hybrid signcryption schemes with outsider security
    • Proceedings of ISC 2005, Springer-Verlag
    • A. W. Dent. Hybrid signcryption schemes with outsider security. In Proceedings of ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 203-217. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3650 , pp. 203-217
    • Dent, A.W.1
  • 11
    • 33646001565 scopus 로고    scopus 로고
    • Signcryption with non-interactive non-repudiation
    • Department of Computer Science, University of Bristol
    • J. Malone-Lee. Signcryption with non-interactive non-repudiation. Technical Report CSTR-02-004, Department of Computer Science, University of Bristol, 2004. http://www.cs.bris.ac.uk/Publications/Papers/1000628.pdf.
    • (2004) Technical Report , vol.CSTR-02-004
    • Malone-Lee, J.1
  • 12
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Springer-Verlag
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology - EUROCRYPT '96, volume 1070, pages 387-398. Springer-Verlag, 1996.
    • (1996) Advances in Cryptology - EUROCRYPT '96 , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 13
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)
    • Advances in Cryptology CRYPTO '97, Springer-Verlag, Unpublished full version (47 pages), dated 1999, available through the author's home page
    • Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In Advances in Cryptology CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 165-179. Springer-Verlag, 1997. Unpublished full version (47 pages), dated 1999, available through the author's home page http://www.sis.uncc.edu/~yzheng/papers/signcrypt.pdf.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.