2012 Seventh International Conference on Availability, Reliability and Security (2008)
Mar. 4, 2008 to Mar. 7, 2008
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ARES.2008.112
In this paper, we propose a signcryption key encapsulation (KEM) scheme and show that the proposed scheme is insider-secure against adaptive chosen ciphertext attack without random oracles and against strongly existential forgery without random oracles. In addition, by simple transformation of the proposed signcryption KEM scheme, we construct an insider-secure signcryption Tag-KEM scheme without random oracles, which responds to the calling from Yoshida and Fujiwara in 2007 on the construction of signcryption Tag-KEM scheme.
Signcryption KEM scheme, Signcryption Tag-KEM scheme
Chik How Tan, "Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles", 2012 Seventh International Conference on Availability, Reliability and Security, vol. 00, no. , pp. 1275-1281, 2008, doi:10.1109/ARES.2008.112