Combined schemes for signature and encryption: The public-key and the identity-based setting
نویسندگان
چکیده
Article history: Received 3 November 2008 Received in revised form 15 August 2013 Available online xxxx
منابع مشابه
Combined (identity-based) public key schemes
Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair—so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of...
متن کاملPublic-Key Encryption Resilient to Linear Related-Key Attacks
In this paper, we consider the security of public-key encryption schemes under linear related-key attacks, where an adversary is allowed to tamper the private key stored in a hardware device, and subsequently observe the outcome of a public-key encryption system under this modified private key. Following the existing work done in recent years, we define the security model for related-key attack...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملSecurity Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"
In this short report we analyse the security of three schemes proposed by J. H. Park et al. in ”Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups”. The schemes make use of trapdoor subgroups of Zn and are secure under new assumptions called q-Trapdoor Subgroup Diffie-Hellman (TSDH) and q-Trapdoor Subgroup Exponent Inversion (TSEI). We show that given several s...
متن کاملSeparable Identity-Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, where an adversary tricks a user into revealing their personal information by impersonating an established company. Such attacks could be mitigated with digitally-signed emails, if these signatures did not: (1) destroy the traditional repudiability of email, and (2) require the unrealistic, widespr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Comput.
دوره 247 شماره
صفحات -
تاریخ انتشار 2016