Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message. Recently, Dent [8, 9] and Bjørstad [4] investigated the possibility of constructing provably secure signcryption schemes using hybrid KEM-DEM techniques [7]. We build on this work by showing that more efficient insider secure hybrid signcryption schemes can be built using tag-KEMs [1]. To prove the effectiveness of this construction, we will provide several examples of secure signcryption tag-KEMs, including a brand new construction based on the Chevallier-Marnes signature scheme [5] which has the tightest known security reductions for both confidentiality and unforgeability. © International Association for Cryptologic Research 2006.
CITATION STYLE
Bjørstad, T. E., & Dent, A. W. (2006). Building better signcryption schemes with tag-KEMs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3958 LNCS, pp. 491–507). Springer Verlag. https://doi.org/10.1007/11745853_32
Mendeley helps you to discover research relevant for your work.