On the security notions of signcryption

    研究成果: Conference contribution

    抄録

    Libert and Quisquater introduced several strong security notions of signcryptions. Recently, Wang, Manulis, Au and Susilo investigated the relationships among them and showed the key invisibility is the strongest one in a sense that the key invisibility implies the other notions. In this paper, we revisit the WMAS's results. We introduce an intermediate notion called the weak key invisibility and show that the combination of the indistinguishability and the ciphertext anonymity implies the weak key invisibility. We also give a condition so that the weak key invisibility is equivalent to the key invisibility.

    本文言語English
    ホスト出版物のタイトルProceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014
    出版社Institute of Electrical and Electronics Engineers Inc.
    ページ231-235
    ページ数5
    ISBN(電子版)9784885522925
    出版ステータスPublished - 2014 12月 8
    イベント2014 International Symposium on Information Theory and Its Applications, ISITA 2014 - Melbourne, Australia
    継続期間: 2014 10月 262014 10月 29

    出版物シリーズ

    名前Proceedings of 2014 International Symposium on Information Theory and Its Applications, ISITA 2014

    Other

    Other2014 International Symposium on Information Theory and Its Applications, ISITA 2014
    国/地域Australia
    CityMelbourne
    Period14/10/2614/10/29

    ASJC Scopus subject areas

    • コンピュータ サイエンスの応用
    • 情報システム

    フィンガープリント

    「On the security notions of signcryption」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

    引用スタイル