@inproceedings{9bb5b7509bcb4d3497f2ad110ecd6a74,
title = "Direct construction of signcryption tag-KEM from standard assumptions in the standard model",
abstract = "The paper presents a direct construction of signcryption tag- KEM under the standard DBDH and CDH assumptions in the standard model, without using strongly unforgeable signature schemes as building blocks. We prove its confidentiality and unforgeability with respect to adversarially-chosen keys where the adversary is given more advantageous attack environment than existing models in the literature. The performance of our construction is comparable to existing signcryption tag-KEM schemes.",
author = "Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou",
year = "2013",
doi = "10.1007/978-3-319-02726-5\_13",
language = "英语",
isbn = "9783319027258",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "167--184",
booktitle = "Information and Communications Security - 15th International Conference, ICICS 2013, Proceedings",
note = "15th International Conference on Information and Communications Security, ICICS 2013 ; Conference date: 20-11-2013 Through 22-11-2013",
}