Title :
Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles
Author_Institution :
Dept. of Comput. Sci. & Media Technol., Gjovik Univ. Coll., Gjovik
Abstract :
In this paper, we propose a signcryption key encapsulation (KEM) scheme and show that the proposed scheme is insider-secure against adaptive chosen ciphertext attack without random oracles and against strongly existential forgery without random oracles. In addition, by simple transformation of the proposed signcryption KEM scheme, we construct an insider-secure signcryption Tag- KEM scheme without random oracles, which responds to the calling from Yoshida and Fujiwara in 2007 on the construction of signcryption Tag-KEM scheme.
Keywords :
cryptography; data encapsulation; digital signatures; adaptive chosen ciphertext attack; insider-secure signcryption tag key encapsulation; random oracle; Authentication; Availability; Computer science; Computer security; Cryptography; Educational institutions; Encapsulation; Forgery; Public key; Random media; Signcryption KEM scheme; Signcryption Tag-KEM scheme;
Conference_Titel :
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
Conference_Location :
Barcelona
Print_ISBN :
978-0-7695-3102-1
DOI :
10.1109/ARES.2008.112