Combined schemes for signature and encryption: The public-key and the identity-based setting

نویسندگان

  • Maria Isabel Gonzalez Vasco
  • Florian Hess
  • Rainer Steinwandt
چکیده

Article history: Received 3 November 2008 Received in revised form 15 August 2013 Available online xxxx

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Combined (identity-based) public key schemes

Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair—so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of...

متن کامل

Public-Key Encryption Resilient to Linear Related-Key Attacks

In this paper, we consider the security of public-key encryption schemes under linear related-key attacks, where an adversary is allowed to tamper the private key stored in a hardware device, and subsequently observe the outcome of a public-key encryption system under this modified private key. Following the existing work done in recent years, we define the security model for related-key attack...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"

In this short report we analyse the security of three schemes proposed by J. H. Park et al. in ”Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups”. The schemes make use of trapdoor subgroups of Zn and are secure under new assumptions called q-Trapdoor Subgroup Diffie-Hellman (TSDH) and q-Trapdoor Subgroup Exponent Inversion (TSEI). We show that given several s...

متن کامل

Separable Identity-Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks

Email phishing attacks are one of today’s most common and costly forms of digital identity theft, where an adversary tricks a user into revealing their personal information by impersonating an established company. Such attacks could be mitigated with digitally-signed emails, if these signatures did not: (1) destroy the traditional repudiability of email, and (2) require the unrealistic, widespr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Comput.

دوره 247  شماره 

صفحات  -

تاریخ انتشار 2016