A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographic hardware device, and observes the result of the cryptographic primitive under this modified private key. In this paper, we consider the security of signcryption schemes under linear RKAs, where an adversary is allowed to tamper the private keys of the receiver and the sender, and subsequently observe the outcome of a signcryption system under these modified private keys of both parties. We define two security notions for RKA-secure signcryption schemes: chosen ciphertext RKA and chosen message RKA. We require that a signcryption scheme remains secure even when an adversary is allowed to access the designcryption oracle and the signcryption ...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
Abstract. Several signcryption schemes proposed in the literature are known to lack semantic securit...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
Abstract. A related-key attack (RKA) occurs when an adversary tam-pers the private key stored in a c...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
Abstract. Signcryption is a public key or asymmetric cryptographic method that provides simultaneous...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Abstract. In the ordinary security model for signature schemes, we consider an adversary that may fo...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
We construct secret-key encryption (SKE) schemes that are secure against related-key attacks and in ...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
Abstract. Signcryption simultaneously offers authentication through unforgeability and confidentiali...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
Abstract. Several signcryption schemes proposed in the literature are known to lack semantic securit...
A related-key attack (RKA) occurs when an adversary tampers the private key stored in a cryptographi...
Abstract. A related-key attack (RKA) occurs when an adversary tam-pers the private key stored in a c...
In this paper, we consider the security of public-key encryption schemes under linear related-key at...
Abstract. Signcryption is a public key or asymmetric cryptographic method that provides simultaneous...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with th...
Abstract. In the ordinary security model for signature schemes, we consider an adversary that may fo...
A signcryption scheme allows a sender to produce a ciphertext for a receiver so that both confidenti...
We construct secret-key encryption (SKE) schemes that are secure against related-key attacks and in ...
Signcryption is a very useful cryptographic primitive that aims to achieve authentication and confid...
Wee (PKC'12) proposed a generic public-key encryption scheme in the setting of related-key attacks. ...
Abstract. Signcryption simultaneously offers authentication through unforgeability and confidentiali...
The idea of signcryption is to provide a method to encrypt and sign data together, so it is more eff...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
Abstract. Several signcryption schemes proposed in the literature are known to lack semantic securit...