Practical Signcryption
In todays world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Series: | Information Security and Cryptography,
|
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-540-89411-7 |
Table of Contents:
- Introduction
- Part I Security Models for Signcryption
- Security for Signcryption: The Two-User Model
- Security for Signcryption: The Multiuser Model
- Part II Signcryption Schemes
- Signcryption Schemes Based on the DiffieHellman Problem
- Signcryption Schemes Based on Bilinear Maps
- Signcryption Schemes Based on the RSA Problem
- Part III Construction Techniques
- Hybrid Signcryption
- Concealment and Its Applications to Authenticated Encryption
- Parallel Signcryption
- Part IV Extensions of Signcryption
- Identity-Based Signcryption
- Key Establishment Using Signcryption Techniques
- Applications of Signcryption
- References
- Index.