GROSS 发表于 2025-3-23 10:10:38

Preliminariesures, public-key encryption including hybrid encryption (key/data encapsulation mechanisms) and tag-based encryption, and finally commitment schemes. The presentation of the primitives provides also the formal security notions that are needed later in our study. The following two sections consider a

EWER 发表于 2025-3-23 14:20:10

Case-Study Primitivesax of the mentioned primitives in addition to their security properties. Since establishing a formal security model for a cryptographic system is a real challenge and divergence between cryptographers, we subject the model we adhere to to an in-depth comparison with the already established ones; our

Generic-Drug 发表于 2025-3-23 21:49:11

Analysis of StEryption is conducted on both the message and the produced signature. The construction was first formally (The idea without proof was already known, for instance, it was mentioned in Damgård and Pedersen (New convertible undeniable signature schemes. In: Maurer UM (ed) Advances in cryptology - EUROCR

饮料 发表于 2025-3-23 23:16:04

An Efficient Variant of StEondition on the base encryption excludes a class of encryption schemes that allows for a great efficiency of the confirmation/denial protocols. In this chapter, we propose an effective variation of StE; we demonstrate its efficiency by explicitly describing the confirmation/denial protocols when the

骚动 发表于 2025-3-24 06:07:22

http://reply.papertrans.cn/99/9817/981689/981689_15.png

向外 发表于 2025-3-24 09:47:46

CtEtS: An Efficient Variant of CtEaS. This makes the paradigm rest on strong encryption (. secure), and rules out consequently homomorphic encryption which is known for propping up verification. In this chapter, we annihilate this weakness and demonstrate the efficiency of the resulting construction by describing many concrete instant

Aprope 发表于 2025-3-24 12:22:53

EtStE: A New Paradigm for Verifiable Signcryptionncryption, these paradigms fail to give similar results. The reason lies in the fact that encryptions are produced on the message, to be signcrypted, in addition to other strings (signatures or decommitments), which renders verification ineffective. The subject of this chapter is a new paradigm for

供过于求 发表于 2025-3-24 15:00:59

Multi-User Securityse. This setting is too simplistic to represent reality, where it is customary to have a network of many users that want to exchange signcrypted messages. Also, it is not uncommon in case of confirmer signatures, to have many signers that share the same confirmer, or conversely a signer who has many

sulcus 发表于 2025-3-24 20:02:04

Insider Privacyying” security of the “base” encryption; i.e. building from . secure encryption (. secure encryption in the multi-user setting) . secure confirmer signatures or signcryption. Such an amplification cannot hold in the insider model since the adversary is given the signing key and can compute valid con

彩色 发表于 2025-3-25 02:00:14

http://reply.papertrans.cn/99/9817/981689/981689_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Verifiable Composition of Signature and Encryption; A Comprehensive Stud Laila El Aimani Book 2017 Springer International Publishing AG 201