This paper expands the notion of a KEM-DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS-KEM - a simple, efficient and provably secure example of a signcryption KEM. Lastly, we briefly discuss the problems associated with using KEMs in key establishment protocols. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Dent, A. W. (2005). Hybrid signcryption schemes with outsider security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3650 LNCS, pp. 203–217). Springer Verlag. https://doi.org/10.1007/11556992_15
Mendeley helps you to discover research relevant for your work.