Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Universally Composable Signcryption. Conference paper. pp 346–353; Cite this conference paper. Download book PDF · Public Key Infrastructure (EuroPKI 2007).
Moreover, we show that a signcryption protocol realizes the signcryption functionality if and only if the corresponding signcryption scheme is secure.
Abstract. One of the challenges within public-key based cryptosystems is providing the user with a convenient interface, while retaining security.
Moreover, we show that a signcryption protocol realizes the signcryption functionality if and only if the corresponding signcryption scheme is secure.
Missing: pdf | Show results with:pdf
This work proposes an ideal functionality for secure messaging, with a user-friendly interface, and shows that, given a public key infrastructure and a ...
Universally Composable Signature, Certification, and Authentication. In Proc. of CSFW, p. 219, 2004. 13. R. Canetti, Y. Dodis, R. Pass, and S. Walfish ...
Universally Composable (UC) protocols provide this guarantee in a strong sense: A protocol re- mains secure even when composed concurrently with an un- bounded ...
Missing: signcryption | Show results with:signcryption
The definition of security allows secure composition of protocols, i.e. given a protocol secure in a hybrid model, and protocols that securely realize all ideal.
Moreover, we show that a signcryption protocol realizes the signcryption functionality if and only if the corresponding signcryption scheme is secure.
Universally composable security: A new paradigm for cryptographic protocols. In Proceedings 42nd IEEE Symposium on Foundations of. Computer Science (pp. 136-145) ...