Practical Signcryption

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Dent, Alexander W. (Editor), Zheng, Yuliang (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Information Security and Cryptography,
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Security Models for Signcryption
  • Security for Signcryption: The Two-User Model
  • Security for Signcryption: The Multi-User Model
  • Signcryption Schemes
  • Signcryption Schemes Based on the Diffie–Hellman Problem
  • Signcryption Schemes Based on Bilinear Maps
  • Signcryption Schemes Based on the RSA Problem
  • Construction Techniques
  • Hybrid Signcryption
  • Concealment and Its Applications to Authenticated Encryption
  • Parallel Signcryption
  • Extensions of Signcryption
  • Identity-Based Signcryption
  • Key Establishment Using Signcryption Techniques
  • Applications of Signcryption.