did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540894094

Practical Signcryption

by ; ;
  • ISBN13:

    9783540894094

  • ISBN10:

    3540894098

  • Format: Hardcover
  • Copyright: 2010-11-29
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $169.99 Save up to $136.58
  • Digital
    $72.39
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality ' the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else.The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the 'œencrypt-then-sign' method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

Table of Contents

Introductionp. 1
Historical Development of Signcryptionp. 1
Coded Modulationp. 1
Musings on Blendingp. 2
Signcryptionp. 5
Provably Secure Signcryptionp. 7
Extensions, Standardization, and Future Research Directionsp. 8
Notation and Security Notionsp. 9
Algorithms and Assignmentp. 10
Signature Schemesp. 11
Public Key Encryptionp. 14
Symmetric Encryptionp. 16
Message Authentication Codesp. 18
Security Models for Signcryption
Security for Signcryption: The Two-User Modelp. 21
Introductionp. 21
Definition of Signcryption in the Two-User Settingp. 23
Two Security Notions in the Two-User Settingp. 23
Discussions on the Security Notionsp. 28
Generic Compositions of Signature and Encryptionp. 30
Constructionp. 30
Security of the Parallel Composition Methodp. 31
Security of the Sequential Composition Methodsp. 32
Multi-user Settingp. 39
Syntaxp. 39
Securityp. 40
Extending Signcryptionp. 40
Security for Signcryption: The Multi-User Modelp. 43
Introductionp. 43
The BSZ Modelp. 44
Confidentiality of Signcryption in the Multi-User BSZ Modelp. 44
Unforgeability of Signcryption in the Multi-User BSZ Modelp. 47
Further Discussions on the Multi-User BSZ Modelp. 50
Example: The Security of Zheng's Signcryption Scheme in the BSZ Modelp. 51
Signcryption Schemes
Signcryption Schemes Based on the Diffie-Hellman Problemp. 57
Introductionp. 57
Diffie-Hellman Problemsp. 58
Zheng's Construction and Its Variantsp. 59
Zheng's Original Schemep. 59
The Bao-Deng Modificationp. 62
A Modification with Public Verifiabilityp. 62
An Encrypt-then-Sign Compositionp. 63
A Scheme with Unforgeability Based on Factoringp. 64
Schemes with Non-repudiationp. 66
A DSA-Based Constructionp. 66
A Scheme Built on Schnorr's Signature Schemep. 67
The CM Schemep. 68
Signcryption Schemes Based on Bilinear Mapsp. 71
Introductionp. 71
Bilinear Map Groupsp. 72
Assumptionsp. 73
Signcryption for Anonymous Communicationsp. 74
Message Privacyp. 75
Ciphertext Unforgeability and Signature Unforgeabilityp. 76
Anonymityp. 77
A Tightly Secure Schemep. 78
The Schemep. 78
Efficiencyp. 79
Securityp. 80
A Scheme with Short Detachable Signaturesp. 86
Efficiencyp. 88
Anonymous Communicationsp. 88
Securityp. 89
Signcryption Schemes Based on the RSA Problemp. 99
Introductionp. 99
The RSA Transformp. 100
Dedicated RSA-Based Signcryption Schemesp. 101
Signcryption from Padding Schemesp. 102
Trapdoor Permutationsp. 102
Extractable Commitmentsp. 102
Padding-Based Signcryption Schemesp. 104
Proof Intuitionp. 109
Signcryption Based on RSA-TBOSp. 110
The TBOS Constructionp. 110
Security Proof for the TBOS Signcryption Schemep. 112
Construction Techniques
Hybrid Signcryptionp. 121
Backgroundp. 121
A Brief Word on Notationp. 123
Preliminariesp. 123
The Hybrid Frameworkp. 123
Security Criteria for Data Encapsulation Mechanismsp. 125
Hybrid Signcryption with Outsider Securityp. 126
An Outsider-Secure Signcryption KEMp. 126
Security Criteria for Outsider-Secure Signcryption KEMsp. 127
Security of the SKEM+DEM Constructionp. 130
Outsider-Secure Hybrid Signcryption in Practicep. 133
Hybrid Signcryption with Insider Securityp. 136
From Outsider to Insider Securityp. 136
Signcryption Tag-KEMsp. 138
Security Criteria for Signcryption Tag-KEMsp. 140
Security of the SCTK+DEM Constructionp. 143
Insider-Secure Hybrid Signcryption in Practicep. 146
Concealment and Its Applications to Authenticated Encryptionp. 149
Introductionp. 149
Domain Extension of Authenticated Encryptionp. 150
Remotely Keyed Authenticated Encryptionp. 152
Definition of Concealmentp. 155
Syntaxp. 155
Security of Concealmentp. 156
Relaxed Concealmentsp. 157
Super-Relaxed Concealmentsp. 157
Comparison to Commitmentp. 157
Constructing Concealment Schemesp. 158
Achieving Hidingp. 158
Achieving Bindingp. 159
Necessity of Assumptionsp. 162
Applications to Authenticated Encryptionp. 163
Definition of Authenticated Encryptionp. 164
Authenticated Encryption of Long Messagesp. 166
Remotely Keyed Authenticated Encryptionp. 169
Parallel Signcryptionp. 175
Introductionp. 175
Concept of Parallel Signcryptionp. 175
Overview of Constructionsp. 176
Generic Parallel Signcryptionp. 178
Description of the Schemep. 178
Security Analysisp. 180
Optimal Parallel Signcryptionp. 185
Description of the Schemep. 185
Security Analysisp. 187
Extensions of Signcryptionp. 195
Identity-Based Signcryptionp. 195
Introductionp. 195
Identity-Based Cryptographyp. 195
Advantages and Disadvantagesp. 197
From IBE to Signcryptionp. 199
Specifying an IBSC Systemp. 200
Concrete IBSC from Pairingsp. 201
The Identity-Based Signcryption Primitivep. 202
Security Definitionsp. 203
Message Confidentialityp. 206
Signature Non-repudiationp. 207
Ciphertext Unlinkabilityp. 208
Ciphertext Authenticationp. 209
Ciphertext Anonymityp. 210
A Concrete IBSC Schemep. 211
The Boneh-Franklin Frameworkp. 211
Fully Secure IBSC Constructionp. 212
A Performance/Security Trade-Offp. 215
Signcrypting for Multiple Recipientsp. 215
Key Establishment Using Signcryption Techniquesp. 217
Introductionp. 217
Formal Security Models for Key Establishmentp. 219
Motivationp. 219
Sessionsp. 220
The Formal Security Modelp. 221
Entity Authenticationp. 223
Forward Secrecyp. 224
Key Compromise Impersonation Attacksp. 224
Notationp. 224
Key Transportp. 225
Key Establishment Based on Zheng's Signcryption Schemep. 226
Key Agreement Based on Signcryption KEMsp. 227
Key Agreement Based on Signcryption KEMsp. 229
Key Agreement Based on Signcryption Tag-KEMsp. 230
Security Proof for the Bjørstad-Dent Protocolp. 232
Key Establishment Based on Timestampsp. 239
Applications of Signcryptionp. 241
Applications Fields of Signcryptionp. 241
Example Applications of Signcryptionp. 242
Secure Multicasting Over the Internetp. 243
Authenticated Key Recoveryp. 246
Secure ATM Networksp. 248
Secure Routing for Mobile Ad Hoc Networksp. 249
Encrypted and Authenticated E-mail by Firewallsp. 251
Signcryption in Secure VoIPp. 252
Applications to Electronic Paymentp. 253
Referencesp. 257
Indexp. 269
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program