The Joint Signature and Encryption Revisited
release_w5oes4j5qzgydmolhlwm5r42m4
by
Laila El Aimani
2016
Abstract
We study the Sign_then_Encrypt, Commit_then_Encrypt_and_Sign, and
Encrypt_then_Sign paradigms in the context of two cryptographic primitives,
namely designated confirmer signatures and signcryption. Our study identifies
weaknesses in those paradigms which impose the use of expensive encryption (as
a building block) in order to meet a reasonable security level. Next, we
propose some optimizations which annihilate the found weaknesses and allow
consequently cheap encryption without compromising the overall security. Our
optimizations further enjoy verifiability, a property profoundly needed in many
real-life applications of the studied primitives.
In text/plain
format
Archived Files and Locations
application/pdf 666.7 kB
file_jugngrvjtvf7dpqnksi3yeuxna
|
arxiv.org (repository) web.archive.org (webarchive) |
1610.09503v1
access all versions, variants, and formats of this works (eg, pre-prints)