A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
On the Security of Joint Signature and Encryption
[chapter]
2002
Lecture Notes in Computer Science
We formally study the notion of a joint signature and encryption in the public-key setting. We refer to this primitive as signcryption, adapting the terminology of [35] . We present two definitions for the security of signcryption depending on whether the adversary is an outsider or a legal user of the system. We then examine generic sequential composition methods of building signcryption from a signature and encryption scheme. Contrary to what recent results in the symmetric setting [5, 22]
doi:10.1007/3-540-46035-7_6
fatcat:qiv7dnmeqjbjteuhvt6qbbqtje