[PDF][PDF] Sequences of games: a tool for taming complexity in security proofs

V Shoup - cryptology eprint archive, 2004‏ - eprint.iacr.org
Sequences of Games: A Tool for Taming Complexity in Security Proofs Page 1 Sequences of
Games: A Tool for Taming Complexity in Security Proofs ∗ Victor Shoup† January 18, 2006 …

Efficient signcryption between TPKC and IDPKC and its multi-receiver construction

YX Sun, H Li - Science China Information Sciences, 2010‏ - Springer
The primitive signcryption provides authenticity and privacy simultaneously. In this paper, we
present efficient signcryption schemes between the traditional public key cryptosystem …

ECGSC: elliptic curve based generalized signcryption

Y Han, X Yang, P Wei, Y Wang, Y Hu - International conference on …, 2006‏ - Springer
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of
signature and encryption. The definition of Generalized Signcryption is proposed in the …

[PDF][PDF] Randomness in digital cryptography: A survey

K Marton, A Suciu, I Ignat - Rom. J. Inf. Sci. Technol, 2010‏ - academia.edu
Digital cryptography relies greatly on randomness in providing the security requirements
imposed by various information systems. Just as different requirements call for specific …

On the joint security of encryption and signature, revisited

KG Paterson, JCN Schuldt, M Stam… - … Conference on the Theory …, 2011‏ - Springer
We revisit the topic of joint security for combined public key schemes, wherein a single
keypair is used for both encryption and signature primitives in a secure manner. While …

[PDF][PDF] Pclsc-tkem: a pairing-free certificateless signcryption-tag key encapsulation mechanism for a privacy-preserving IoT.

SH Seo, J Won, E Bertino - Trans. Data Priv., 2016‏ - tdp.cat
Certificateless Signcryption Tag Key Encapsulation Mechanism (CLSC-TKEM) is an
effective method for simultaneously providing key encapsulation and a digital signature on …

Improved Signcryption from q-Diffie-Hellman Problems

B Libert, JJ Quisquater - International Conference on Security in …, 2004‏ - Springer
This paper proposes a new public key authenticated encryption (signcryption) scheme
based on the hardness of q-Diffie-Hellman problems in Gap Diffie-Hellman groups. This new …

Author

AN Author - Proc. 12 th Int. Zeolite Conf, 1998‏ - HeinOnline
BRIEFS BY AUTHOR BRIEFS CASE NOTES BY AUTHOR CASE NOTES BY TITLE Page 1
Cumulative Index: Vols. 1-10 BRIEFS BY AUTHOR BEASLEY, VICKY L., DEVON W …

[PDF][PDF] Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing

S Seo, E Bertino - CERIAS, West Lafayette, IN, USA, Tech. Rep …, 2013‏ - cerias.purdue.edu
Signcryption is a scheme that provides confidentiality and authentication while kee**
costs low in comparison to independent encryption and message sign ing. Since Zheng [13] …

On the security of padding-based encryption schemes–or–why we cannot prove OAEP secure in the standard model

E Kiltz, K Pietrzak - Advances in Cryptology-EUROCRYPT 2009: 28th …, 2009‏ - Springer
We investigate the security of “padding-based” encryption schemes in the standard model.
This class contains all public-key encryption schemes where the encryption algorithm first …