Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Journal of Cryptology
Generic Constructions of Identity-Based and Certificateless KEMs
Journal of Cryptology
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Hybrid signcryption schemes with insider security
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hybrid signcryption schemes with outsider security
ISC'05 Proceedings of the 8th international conference on Information Security
Building better signcryption schemes with Tag-KEMs
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless KEM and hybrid signcryption schemes revisited
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in the certificateless setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption tag-KEM to the certificateless setting. We show how to construct a certificateless signcryption scheme using certificateless signcryption tag-KEM. We also give an example of certificateless signcryption tag-KEM.