Signcryption KEM/tag-KEM, revisited

Research output: Contribution to journalArticlepeer-review

Abstract

We revisit the problem of basing signcryption (SC) (tag) key encapsulation mechanism (KEM) on standard assumptions and standard model and present direct constructions of SC-KEM/tag-KEM, which satisfy confidentiality and unforgeability with respect to adversarially chosen keys where the adversary is given more advantageous attack environment than existing models in the literature; are based on the standard decisional bilinear Diffie-Hellman and computational Diffie-Hellman assumptions without random oracle; do not use strongly unforgeable signature schemes as building blocks; and provide comparable performance to existing SC-KEM/tag-KEM schemes. Both constructions do not require the knowledge about the recipient's private keys to verify the validity of the ciphertexts and thus can be used in applications where a ciphertext needs to be validated by any third party that only knows the public key of the sender as in usual signature scheme.

Original languageEnglish
Pages (from-to)3067-3082
Number of pages16
JournalSecurity and Communication Networks
Volume8
Issue number17
DOIs
StatePublished - 25 Nov 2015

Keywords

  • Key encapsulation mechanism
  • Signcryption
  • Standard assumption
  • Standard model
  • Tag

Fingerprint

Dive into the research topics of 'Signcryption KEM/tag-KEM, revisited'. Together they form a unique fingerprint.

Cite this