TY - GEN
T1 - On the security notions of signcryption
AU - Hasegawa, Shingo
AU - Isobe, Shuji
N1 - Publisher Copyright:
© 2014 IEICE.
PY - 2014/12/8
Y1 - 2014/12/8
N2 - Libert and Quisquater introduced several strong security notions of signcryptions. Recently, Wang, Manulis, Au and Susilo investigated the relationships among them and showed the key invisibility is the strongest one in a sense that the key invisibility implies the other notions. In this paper, we revisit the WMAS's results. We introduce an intermediate notion called the weak key invisibility and show that the combination of the indistinguishability and the ciphertext anonymity implies the weak key invisibility. We also give a condition so that the weak key invisibility is equivalent to the key invisibility.
AB - Libert and Quisquater introduced several strong security notions of signcryptions. Recently, Wang, Manulis, Au and Susilo investigated the relationships among them and showed the key invisibility is the strongest one in a sense that the key invisibility implies the other notions. In this paper, we revisit the WMAS's results. We introduce an intermediate notion called the weak key invisibility and show that the combination of the indistinguishability and the ciphertext anonymity implies the weak key invisibility. We also give a condition so that the weak key invisibility is equivalent to the key invisibility.
UR - http://www.scopus.com/inward/record.url?scp=84920524271&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84920524271&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84920524271
T3 - Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
SP - 231
EP - 235
BT - Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
Y2 - 26 October 2014 through 29 October 2014
ER -