2018
DOI: 10.1007/978-3-319-98113-0_6
|View full text |Cite
|
Sign up to set email alerts
|

A Constructive Perspective on Signcryption Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…A natural use of a signcryption scheme is to build an asynchronous secure channel i. e. a confidential and authenticated asynchronous channel. Given the similar uses of signcryption and (one pass) Key Exchange Protocols (KEP), to build confidential and authenticated channels, it appears, from a real world perspective, that the right security definition for signcryption schemes is insider security [3]. Informally, insider security ensures (i) confidentiality even if the sender's static private key is revealed to the attacker, and (ii) unforgeability even if the receiver's static private key is disclosed.…”
Section: Introductionmentioning
confidence: 99%
“…A natural use of a signcryption scheme is to build an asynchronous secure channel i. e. a confidential and authenticated asynchronous channel. Given the similar uses of signcryption and (one pass) Key Exchange Protocols (KEP), to build confidential and authenticated channels, it appears, from a real world perspective, that the right security definition for signcryption schemes is insider security [3]. Informally, insider security ensures (i) confidentiality even if the sender's static private key is revealed to the attacker, and (ii) unforgeability even if the receiver's static private key is disclosed.…”
Section: Introductionmentioning
confidence: 99%