On the Joint Security of Encryption and Signature, Revisited
From MaRDI portal
Publication:3102184
DOI10.1007/978-3-642-25385-0_9zbMath1227.94061OpenAlexW1597823478MaRDI QIDQ3102184
Martijn Stam, Jacob C. N. Schuldt, Kenneth G. Paterson, Susan Thomson
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_9
Related Items (11)
On the Joint Security of Encryption and Signature in EMV ⋮ Short Integrated PKE+PEKS in Standard Model ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ You can sign but not decrypt: hierarchical integrated encryption and signature ⋮ Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) ⋮ A formal security analysis of the Signal messaging protocol ⋮ Generic constructions of integrated PKE and PEKS ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption ⋮ Combined schemes for signature and encryption: the public-key and the identity-based setting
Uses Software
This page was built for publication: On the Joint Security of Encryption and Signature, Revisited