Practical Signcryption
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Series: | Information Security and Cryptography,
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Security Models for Signcryption
- Security for Signcryption: The Two-User Model
- Security for Signcryption: The Multi-User Model
- Signcryption Schemes
- Signcryption Schemes Based on the Diffie–Hellman Problem
- Signcryption Schemes Based on Bilinear Maps
- Signcryption Schemes Based on the RSA Problem
- Construction Techniques
- Hybrid Signcryption
- Concealment and Its Applications to Authenticated Encryption
- Parallel Signcryption
- Extensions of Signcryption
- Identity-Based Signcryption
- Key Establishment Using Signcryption Techniques
- Applications of Signcryption.