The Community for Technology Leaders
RSS Icon
Subscribe
Mar. 4, 2008 to Mar. 7, 2008
ISBN: 978-0-7695-3102-1
pp: 1275-1281
ABSTRACT
In this paper, we propose a signcryption key encapsulation (KEM) scheme and show that the proposed scheme is insider-secure against adaptive chosen ciphertext attack without random oracles and against strongly existential forgery without random oracles. In addition, by simple transformation of the proposed signcryption KEM scheme, we construct an insider-secure signcryption Tag-KEM scheme without random oracles, which responds to the calling from Yoshida and Fujiwara in 2007 on the construction of signcryption Tag-KEM scheme.
INDEX TERMS
Signcryption KEM scheme, Signcryption Tag-KEM scheme
CITATION
Chik How Tan, "Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles", ARES, 2008, 2012 Seventh International Conference on Availability, Reliability and Security, 2012 Seventh International Conference on Availability, Reliability and Security 2008, pp. 1275-1281, doi:10.1109/ARES.2008.112
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool