Abstract. A related-key attack (RKA) occurs when an adversary tam-pers the private key stored in a cryptographic hardware device and ob-serves the result of the cryptographic primitive under this modified pri-vate key. In this paper, we concentrate on the security of anonymous signcryption schemes under related-key attacks, in the sense that a sign-cryption system should contain no information that identifies the sender of the signcryption and the receiver of the message, and yet be decipher-able by the targeted receiver. To achieve this, we consider our anony-mous signcryption scheme being semantically secure against chosen ci-phertext and related-key attacks (CC-RKA), existentially unforgeable against chosen message and related-key attack...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
In the ordinary security model for signature schemes, we consider an adversary that may forge a sign...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Abstract. Signcryption is a public key or asymmetric cryptographic method that provides simultaneous...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993. It is essentially...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
Abstract. In the ordinary security model for signature schemes, we consider an adversary that may fo...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and ...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
In the ordinary security model for signature schemes, we consider an adversary that may forge a sign...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Abstract. Signcryption is a public key or asymmetric cryptographic method that provides simultaneous...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
The notion of a related-key attack (RKA) was formally introduced by Biham in 1993. It is essentially...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
Abstract. In the ordinary security model for signature schemes, we consider an adversary that may fo...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and ...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provide...
In the ordinary security model for signature schemes, we consider an adversary that may forge a sign...