Hybrid signcryption schemes with outsider security

66Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper expands the notion of a KEM-DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS-KEM - a simple, efficient and provably secure example of a signcryption KEM. Lastly, we briefly discuss the problems associated with using KEMs in key establishment protocols. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Dent, A. W. (2005). Hybrid signcryption schemes with outsider security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3650 LNCS, pp. 203–217). Springer Verlag. https://doi.org/10.1007/11556992_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free