메뉴 건너뛰기




Volumn 20, Issue 2, 2007, Pages 203-235

Formal proofs for the security of signcryption

Author keywords

Flexible signcryption unsigncryption oracle models; Gap Diffie Hellman problem; Gap discrete log problem; Signcryption

Indexed keywords

FLEXIBLE SIGNCRYPTION; GAP DIFFIE-HELLMAN PROBLEM; GAP DISCRETE LOG PROBLEM; SIGNCRYPTION; UNSIGNCRYPTION ORACLE MODELS;

EID: 33947512019     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-007-0211-0     Document Type: Article
Times cited : (120)

References (36)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the Security of Joint Signature and Encryption
    • Advances in Cryptology, Proceedings of EUROCRYPT of, Springer-Verlag, Berlin
    • J. An, Y. Dodis and T. Rabin: On the Security of Joint Signature and Encryption, Advances in Cryptology - Proceedings of EUROCRYPT 2002, Vol. 2332 of LNCS, Springer-Verlag, Berlin, 2002, pages 83-107.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 33947504321 scopus 로고    scopus 로고
    • On the Security of Joint Signature and Encryption
    • Report 2002/046, Cryptology ePrint Archive, 2002
    • J. An, Y. Dodis and T. Rabin: On the Security of Joint Signature and Encryption, Report 2002/046, Cryptology ePrint Archive, 2002.
    • An, J.1    Dodis, Y.2    Rabin, T.3
  • 3
    • 84958982846 scopus 로고    scopus 로고
    • Formal Proofs for the Security of Signcryption
    • Proceedings of Public Key Cryptography 2002 PKC 2002, of, Springer-Verlag, Berlin
    • J. Baek, R. Steinfeld and Y. Zheng: Formal Proofs for the Security of Signcryption, Proceedings of Public Key Cryptography 2002 (PKC 2002), Vol. 2274 of LNCS, Springer-Verlag, Berlin, 2002, pages 80-98.
    • (2002) LNCS , vol.2274 , pp. 80-98
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 4
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treament of Symmetric Encryption
    • 97, IEEE Computer Society Press, Los Alamitos, CA
    • M. Bellare, A. Desai, E. Jokipii and P. Rogaway: A Concrete Security Treament of Symmetric Encryption, Proceedings of FOCS '97, IEEE Computer Society Press, Los Alamitos, CA, 1997, pages 394-403.
    • (1997) Proceedings of FOCS , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway: Relations Among Notions of Security for Public-Key Encryption Schemes, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 26-45.
    • (1998) LNCS , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated Enciyption: Relations Among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology - Proceedings of ASIACRYPT
    • of, Springer-Verlag, Berlin
    • M. Bellare and C. Namprepre: Authenticated Enciyption: Relations Among Notions and Analysis of the Generic Composition Paradigm, Advances in Cryptology - Proceedings of ASIACRYPT 2000, Vol. 1976 of LNCS, Springer-Verlag, Berlin, 2000, pages 531-545.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprepre, C.2
  • 8
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption
    • Advances in Cryptology, Proceedings of Eurocrypt '94, 950 of, Springer-Verlag, Berlin
    • M. Bellare and P. Rogaway: Optimal Asymmetric Encryption, Advances in Cryptology - Proceedings of Eurocrypt '94, Vol. 950 of LNCS, Springer-Verlag, Berlin, 1994, pages 92-111.
    • (1994) LNCS , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 33746324205 scopus 로고    scopus 로고
    • The Game-Playing Technique
    • Report 2004/331, International Association for Cryptographic Research (IACR) ePrint Archive
    • M. Bellare and P. Rogaway: The Game-Playing Technique, Report 2004/331, International Association for Cryptographic Research (IACR) ePrint Archive, 2004.
    • (2004)
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
    • R. Cramer and V. Shoup: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 13-25.
    • (1998) LNCS , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 11
    • 33947519900 scopus 로고    scopus 로고
    • R. Cramer and V. Shoup: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, Report 2001/108, International Association for Cryptographic Research (IACR) ePrint Archive, 2001.
    • R. Cramer and V. Shoup: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, Report 2001/108, International Association for Cryptographic Research (IACR) ePrint Archive, 2001.
  • 12
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • T. ElGamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, Vol. 31, 1985, pages 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 84990731886 scopus 로고
    • How to Prove Yourself: Practical Solutions of Identification and Signature Problems
    • Proceedings of CRYPTO '86, 263 of, Springer-Verlag, Berlin
    • A. Fiat and A. Shamir: How to Prove Yourself: Practical Solutions of Identification and Signature Problems, Proceedings of CRYPTO '86, Vol. 263 of LNCS, Springer-Verlag, Berlin, 1987, pages 186-194.
    • (1987) LNCS , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 14
    • 84956859011 scopus 로고    scopus 로고
    • How to Enhance the Security of Public-Key Encryption at Minimum Cost
    • Proceedings of Public Key Cryptography '99 PKC '99, of, Springer-Verlag, Berlin
    • E. Fujisaki and T. Okamoto: How to Enhance the Security of Public-Key Encryption at Minimum Cost, Proceedings of Public Key Cryptography '99 (PKC '99), Vol. 1666 of LNCS, Springer-Verlag, Berlin, 1999, pages 53-68.
    • (1999) LNCS , vol.1666 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 16
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali and R. Rivest: A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, Vol. 17, No. 2, 1988, pages 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 17
    • 84945137421 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • Advances in Cryptology, Proceedings of EUROCRYPT of, Springer-Verlag, Berlin
    • C. Jutla: Encryption Modes with Almost Free Message Integrity, Advances in Cryptology - Proceedings of EUROCRYPT 2001, Vol. 2045 of LNCS, Springer-Verlag, Berlin, 2001, pages 529-544.
    • (2001) LNCS , vol.2045 , pp. 529-544
    • Jutla, C.1
  • 18
    • 84880901653 scopus 로고    scopus 로고
    • The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)
    • Advances in Cryptology, Proceedings of CRYPTO of, Springer-Verlag, Berlin
    • H. Krawczyk: The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?), Advances in Cryptology - Proceedings of CRYPTO 2001, Vol. 2139 of LNCS, Springer-Verlag, Berlin, 2001, pages 310-331.
    • (2001) LNCS , vol.2139 , pp. 310-331
    • Krawczyk, H.1
  • 20
    • 84957705622 scopus 로고    scopus 로고
    • On Concrete Security Treatment of Signatures Derived from Identification
    • Advances in Cryptology, Proceedings of CRYPTO '98, 1462 of, Springer-Verlag, Berlin
    • K. Ohta and T. Okamoto: On Concrete Security Treatment of Signatures Derived from Identification, Advances in Cryptology - Proceedings of CRYPTO '98, Vol. 1462 of LNCS, Springer-Verlag, Berlin, 1998, pages 354-369.
    • (1998) LNCS , pp. 354-369
    • Ohta, K.1    Okamoto, T.2
  • 21
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
    • Proceedings of Public Key Cryptography 2001 PKC 2001, of, Springer-Verlag, Berlin
    • T. Okamoto and D. Pointcheval: The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes, Proceedings of Public Key Cryptography 2001 (PKC 2001), Vol. 1992 of LNCS, Springer-Verlag, Berlin, 2001, pages 104-118.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 22
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security for Any One-Way Cryptosystem
    • Proceedings of Public Key Cryptography 2000 PKC 2000, of, Springer-Verlag, Berlin
    • D. Pointcheval: Chosen-Ciphertext Security for Any One-Way Cryptosystem, Proceedings of Public Key Cryptography 2000 (PKC 2000), Vol. 1751 of LNCS, Springer-Verlag, Berlin, 2000, pages 129-146.
    • (2000) LNCS , vol.1751 , pp. 129-146
    • Pointcheval, D.1
  • 24
    • 84974554584 scopus 로고
    • Non-Interacitve Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Advances in Cryptology, Proceedings of CRYPTO '91, 576 of, Springer-Verlag, Berlin
    • C. Rackoff and D. Simon : Non-Interacitve Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of CRYPTO '91, Vol. 576 of LNCS, Springer-Verlag, Berlin, 1992, pages 433-444.
    • (1992) LNCS , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 26
    • 85032873931 scopus 로고
    • Efficient Identification and Signatures for Smart Cards
    • Advances in Cryptology, Proceedings of CRYPTO '89, 435 of, Springer-Verlag, Berlin
    • C. P. Schnorr: Efficient Identification and Signatures for Smart Cards, Advances in Cryptology - Proceedings of CRYPTO '89, Vol. 435 of LNCS, Springer-Verlag, Berlin, 1990, pages 235-251.
    • (1990) LNCS , pp. 235-251
    • Schnorr, C.P.1
  • 27
    • 84937417404 scopus 로고    scopus 로고
    • Security of Signed ElGamal Encryption
    • Advances in Cryptology, Proceedings of ASIACRYPT of, Springer-Verlag, Berlin
    • C. P. Schnorr and M. Jakobsson: Security of Signed ElGamal Encryption, Advances in Cryptology - Proceedings of ASIACRYPT2000, Vol. 1976 of LNCS, Springer-Verlag, Berlin, 2000, pages 73-89.
    • (2000) LNCS , vol.1976 , pp. 73-89
    • Schnorr, C.P.1    Jakobsson, M.2
  • 28
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of Games: A Tool for Taming Complexity in Security Proofs
    • Report 2004/332, International Association for Cryptographic Research (IACR) ePrint Archive
    • V. Shoup: Sequences of Games: A Tool for Taming Complexity in Security Proofs, Report 2004/332, International Association for Cryptographic Research (IACR) ePrint Archive, 2004.
    • (2004)
    • Shoup, V.1
  • 29
    • 84888872516 scopus 로고    scopus 로고
    • Securing Threshold Cryptosystems against Chosen Ciphertext Attack
    • Advances in Cryptology, Proceedings of EUROCRYPT '98, 1403 of, Springer-Verlag, Berlin
    • V. Shoup and R. Gennaro: Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Advances in Cryptology - Proceedings of EUROCRYPT '98, Vol. 1403 of LNCS, Springer-Verlag, Berlin, 1998, pages 1-16.
    • (1998) LNCS , pp. 1-16
    • Shoup, V.1    Gennaro, R.2
  • 31
    • 84944242785 scopus 로고    scopus 로고
    • R. Steinfeld and Y. Zheng: A Signcryption Scheme Based on Integer Factorization, Proceedings of Information Security Workshop 2000 (ISW 2000), 1975 of LNCS, Springer-Verlag, Berlin, 2000, pages 308-322.
    • R. Steinfeld and Y. Zheng: A Signcryption Scheme Based on Integer Factorization, Proceedings of Information Security Workshop 2000 (ISW 2000), Vol. 1975 of LNCS, Springer-Verlag, Berlin, 2000, pages 308-322.
  • 32
    • 84958979582 scopus 로고    scopus 로고
    • On the Security of ElGamal-Based Encryption
    • Proceedings of Public Key Cryptography '98 PKC '98, of, Springer-Verlag, Berlin
    • Y. Tsiounis and M. Yung: On the Security of ElGamal-Based Encryption, Proceedings of Public Key Cryptography '98 (PKC '98), Vol. 1431 of LNCS, Springer-Verlag, Berlin, 1998, pages 117-134.
    • (1998) LNCS , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 33
    • 63449122349 scopus 로고    scopus 로고
    • Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption)
    • Advances in Cryptology, Proceedings CRYPTO '97, 1294 of, Springer-Verlag, Berlin
    • Y. Zheng: Digital Signcryption or How to Achieve Cost (Signature & Encryption) ≪ Cost (Signature) + Cost (Encryption), Advances in Cryptology - Proceedings CRYPTO '97, Vol. 1294 of LNCS, Springer-Verlag, Berlin, 1997, pages 165-179.
    • (1997) LNCS , pp. 165-179
    • Zheng, Y.1
  • 36
    • 0027614629 scopus 로고    scopus 로고
    • Y. Zheng and J. Seberry: Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks, IEEE Journal on Selected Areas in Communications, 11, No. 5, 1993, pages 715-724 (Special Issue on Secure Communications).
    • Y. Zheng and J. Seberry: Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pages 715-724 (Special Issue on Secure Communications).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.