Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"

@inproceedings{Wang2013RelationsAP,
  title={Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"},
  author={Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo},
  booktitle={ACISP},
  year={2013}
}
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and key invisibility to protect the identities of signcryption users and were able to prove that key… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 26 references

Practical Signcryption

  • A. W. Dent, Zheng, Y. eds.
  • Springer
  • 2010
2 Excerpts

On the security of signcryption scheme with key privacy

  • Tan, C.-H.
  • IEICE Trans. Fundam. Electron. Commun. Comput…
  • 2005
2 Excerpts

Similar Papers

Loading similar papers…