Certificateless hybrid signcryption

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then- encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in the certificateless setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption tag-KEM to the certificateless setting. We show how to construct a certificateless signcryption scheme using certificateless signcryption tag-KEM. We also give an example of certificateless signcryption tag-KEM.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings
Pages112-123
Number of pages12
DOIs
Publication statusPublished - Nov 9 2009
Event5th International Conference on Information Security Practice and Experience, ISPEC 2009 - Xi'an, China
Duration: Apr 13 2009Apr 15 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5451 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Information Security Practice and Experience, ISPEC 2009
CountryChina
CityXi'an
Period4/13/094/15/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Certificateless hybrid signcryption'. Together they form a unique fingerprint.

  • Cite this

    Li, F., Shirase, M., & Takagi, T. (2009). Certificateless hybrid signcryption. In Information Security Practice and Experience - 5th International Conference, ISPEC 2009, Proceedings (pp. 112-123). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5451 LNCS). https://doi.org/10.1007/978-3-642-00843-6_11