A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Versatile padding schemes for joint signature and encryption
Proceedings of the 11th ACM conference on Computer and communications security
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography
On the Security of Signcryption Scheme with Key Privacy
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Analysis of improved signcryption scheme with key privacy
Information Processing Letters
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Formal Proofs for the Security of Signcryption
Journal of Cryptology
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Chosen-Ciphertext Security from Identity-Based Encryption
SIAM Journal on Computing
Forgery of Provable Secure Short Signcryption Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Provably secure encrypt-then-sign composition in hybrid signcryption
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Concealment and its applications to authenticated encryption
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Two birds one stone: signcryption using RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Efficient short signcryption scheme with public verifiability
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Hybrid signcryption schemes with insider security
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Improved signcryption from q-Diffie-Hellman problems
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Hybrid signcryption schemes with outsider security
ISC'05 Proceedings of the 8th international conference on Information Security
Analysis and improvement of a signcryption scheme with key privacy
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient Constructions of Signcryption Schemes and Signcryption Composability
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Efficient generic constructions of signcryption with insider security in the multi-user setting
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Efficient signcryption in the standard model
Concurrency and Computation: Practice & Experience
How to achieve non-repudiation of origin with privacy protection in cloud computing
Journal of Computer and System Sciences
Hi-index | 0.00 |
Since the notion of signcryption scheme was introduced by Zheng in 1997, many signcryption schemes were proposed. In 2002, An et al. introduced an insider and outsider security of signcryption scheme. Their insider security model was based on the so-called g -CCA2 security which was a relaxation of CCA2 security (adaptive chosen ciphertext attacks security). The g -CCA2 security means that an attacker is not allowed to query the "equivalent" challenged ciphertext (which is produced by the same challenged plaintext). Recently, many insider-secure signcryption schemes were proposed and provably insider-secure in the random oracles model based on the usual CCA2 security (not the g -CCA2 security), for example, Libert-Quisquater's signcryption schemes at PKC'2004 and SCN'2004 respectively, Yang et al.'s signcryption scheme at ISC'2005 and Ma's signcryption scheme at Inscrypt'2006. But, Tan showed that these signcryption schemes were not insider-secure against either adaptive chosen ciphertext attacks or forgery in two-user setting. In this paper, we proposed an insider-secure signcryption scheme based on encrypt-then-sign structure and it is provably insider-secure in a multi-user setting without random oracles based on the usual CCA2 security. The other advantage of the proposed signcryption scheme is that the ciphertext is publicly verifiable and corresponds to the unique plaintext.