Practical Signcryption

In todays world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality  the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Dent, Alexander W. (Editor), Zheng, Yuliang. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Information Security and Cryptography,
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-540-89411-7
Table of Contents:
  • Introduction
  • Part I  Security Models for Signcryption
  • Security for Signcryption: The Two-User Model
  • Security for Signcryption: The Multiuser Model
  • Part II  Signcryption Schemes
  • Signcryption Schemes Based on the DiffieHellman Problem
  • Signcryption Schemes Based on Bilinear Maps
  • Signcryption Schemes Based on the RSA Problem
  • Part III  Construction Techniques
  • Hybrid Signcryption
  • Concealment and Its Applications to Authenticated Encryption
  • Parallel Signcryption
  • Part IV  Extensions of Signcryption
  • Identity-Based Signcryption
  • Key Establishment Using Signcryption Techniques
  • Applications of Signcryption
  • References
  • Index.