Certificateless Hybrid Signcryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Efficient Signcryption Key Encapsulation without Random Oracles
Information Security and Cryptology
Efficient Constructions of Signcryption Schemes and Signcryption Composability
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Signcryption with non-interactive non-repudiation without random oracles
Transactions on computational science X
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Efficient signcryption in the standard model
Concurrency and Computation: Practice & Experience
Constructing practical signcryption KEM from standard assumptions without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
In this paper, we propose a signcryption key encapsulation (KEM) scheme and show that the proposed scheme is insider-secure against adaptive chosen ciphertext attack without random oracles and against strongly existential forgery without random oracles. In addition, by simple transformation of the proposed signcryption KEM scheme, we construct an insider-secure signcryption Tag-KEM scheme without random oracles, which responds to the calling from Yoshida and Fujiwara in 2007 on the construction of signcryption Tag-KEM scheme.