Direct construction of signcryption tag-KEM from standard assumptions in the standard model

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The paper presents a direct construction of signcryption tag- KEM under the standard DBDH and CDH assumptions in the standard model, without using strongly unforgeable signature schemes as building blocks. We prove its confidentiality and unforgeability with respect to adversarially-chosen keys where the adversary is given more advantageous attack environment than existing models in the literature. The performance of our construction is comparable to existing signcryption tag-KEM schemes.

Original languageEnglish
Title of host publicationInformation and Communications Security - 15th International Conference, ICICS 2013, Proceedings
Pages167-184
Number of pages18
DOIs
StatePublished - 2013
Event15th International Conference on Information and Communications Security, ICICS 2013 - Beijing, China
Duration: 20 Nov 201322 Nov 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8233 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Information and Communications Security, ICICS 2013
Country/TerritoryChina
CityBeijing
Period20/11/1322/11/13

Fingerprint

Dive into the research topics of 'Direct construction of signcryption tag-KEM from standard assumptions in the standard model'. Together they form a unique fingerprint.

Cite this