The Second International Conference on Availability, Reliability and Security (ARES'07) 2007
DOI: 10.1109/ares.2007.101
|View full text |Cite
|
Sign up to set email alerts
|

Insider-secure Hybrid Signcryption SchemeWithout Random Oracles

Abstract: Confidentiality and authenticity are two important security requirements in most secure systems. To efficiently provide data privacy (confidentiality) and (data/user) authenticity simultaneously, the notion of signcryption scheme was first introduced by Zheng in 1997. The security model for signcryption scheme was proposed by Baek et al. and An et al. in 2002 independently. Since then, many signcryption schemes were proposed; they are either a public-key signcryption or a hybrid signcryption. But, only few pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
(54 reference statements)
0
3
0
Order By: Relevance
“…In 2007, Tan proposed a hybrid signcryption scheme in the standard model using a key derivation function, a one‐time message authentication code, a one‐time symmetric key encryption scheme, and a strongly unforgeable signature scheme in the standard model . This signcryption scheme is a hybrid construction.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2007, Tan proposed a hybrid signcryption scheme in the standard model using a key derivation function, a one‐time message authentication code, a one‐time symmetric key encryption scheme, and a strongly unforgeable signature scheme in the standard model . This signcryption scheme is a hybrid construction.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with Tan's schemes, , Li et al 's corresponding schemes have 20 % faster speed in the key encapsulation, 33 % faster speed in the key decapsulation, 33 % shorter public key, 60 % shorter private key, and | p | bits shorter ciphertext. All of these schemes are hybrid construction. In 2008, Tan proposed a signcryption scheme based on the Boneh and Boyen's identity‐based encryption scheme and the Boneh and Boyen's short signature scheme .…”
Section: Introductionmentioning
confidence: 99%
“…Even if the receiver's private key is discovered, the attacker will not be able to know the real message from the ciphertext. The other type of security which is the outsider security, it means to keep protecting from the third party's attacks, as the attacker knows the public keys of the sender and receiver of the message [18].…”
Section: Signcryption Reviewmentioning
confidence: 99%