Introduction / Yuliang Zheng1: |
Historical Development of Signcryption / 1.1: |
Coded Modulation / 1.1.1: |
Musings on Blending / 1.1.2: |
Signcryption / 1.1.3: |
Provably Secure Signcryption / 1.1.4: |
Extensions, Standardization, and Future Research Directions / 1.2: |
Notation and Security Notions / 1.3: |
Algorithms and Assignment / 1.3.1: |
Signature Schemes / 1.3.2: |
Public Key Encryption / 1.3.3: |
Symmetric Encryption / 1.3.4: |
Message Authentication Codes / 1.3.5: |
Security Models for Signcryption / Part I: |
Security for Signcryption: The Two-User Model / Jee Hea An ; Tal Rabin2: |
Definition of Signcryption in the Two-User Setting / 2.1: |
Two Security Notions in the Two-User Setting / 2.2.1: |
Discussions on the Security Notions / 2.2.2: |
Generic Compositions of Signature and Encryption / 2.3: |
Construction / 2.3.1: |
Security of the Parallel Composition Method / 2.3.2: |
Security of the Sequential Composition Methods / 2.3.3: |
Multi-user Setting / 2.4: |
Syntax / 2.4.1: |
Security / 2.4.2: |
Extending Signcryption / 2.4.3: |
Security for Signcryption: The Multi-User Model / Joonsang Baek ; Ron Steinfeld3: |
The BSZ Model / 3.1: |
Confidentiality of Signcryption in the Multi-User BSZ Model / 3.2.1: |
Unforgeability of Signcryption in the Multi-User BSZ Model / 3.2.2: |
Further Discussions on the Multi-User BSZ Model / 3.2.3: |
Example: The Security of Zheng's Signcryption Scheme in the BSZ Model / 3.3: |
Signcryption Schemes / Part II: |
Signcryption Schemes Based on the Diffie-Hellman Problem / Paulo S.L.M. Barreto ; Benoît Libert ; Noel McCullagh ; Jean-Jacques Quisquater4: |
Diffie-Hellman Problems / 4.1: |
Zheng's Construction and Its Variants / 4.3: |
Zheng's Original Scheme / 4.3.1: |
The Bao-Deng Modification / 4.3.2: |
A Modification with Public Verifiability / 4.3.3: |
An Encrypt-then-Sign Composition / 4.4: |
A Scheme with Unforgeability Based on Factoring / 4.5: |
Schemes with Non-repudiation / 4.6: |
A DSA-Based Construction / 4.6.1: |
A Scheme Built on Schnorr's Signature Scheme / 4.6.2: |
The CM Scheme / 4.7: |
Signcryption Schemes Based on Bilinear Maps / 5: |
Bilinear Map Groups / 5.1: |
Assumptions / 5.3: |
Signcryption for Anonymous Communications / 5.4: |
Message Privacy / 5.4.1: |
Ciphertext Unforgeability and Signature Unforgeability / 5.4.2: |
Anonymity / 5.4.3: |
A Tightly Secure Scheme / 5.5: |
The Scheme / 5.5.1: |
Efficiency / 5.5.2: |
A Scheme with Short Detachable Signatures / 5.5.3: |
Anonymous Communications / 5.6.1: |
Signcryption Schemes Based on the RSA Problem / Alexander W. Dent ; John Malone-Lee5.6.3: |
The RSA Transform / 6.1: |
Dedicated RSA-Based Signcryption Schemes / 6.3: |
Signcryption from Padding Schemes / 6.4: |
Trapdoor Permutations / 6.4.1: |
Extractable Commitments / 6.4.2: |
Padding-Based Signcryption Schemes / 6.4.3: |
Proof Intuition / 6.4.4: |
Signcryption Based on RSA-TBOS / 6.5: |
The TBOS Construction / 6.5.1: |
Security Proof for the TBOS Signcryption Scheme / 6.5.2: |
Construction Techniques / Part III: |
Hybrid Signcryption / Tor E. Bjørstad7: |
Background / 7.1: |
A Brief Word on Notation / 7.1.1: |
Preliminaries / 7.2: |
The Hybrid Framework / 7.2.1: |
Security Criteria for Data Encapsulation Mechanisms / 7.2.2: |
Hybrid Signcryption with Outsider Security / 7.3: |
An Outsider-Secure Signcryption KEM / 7.3.1: |
Security Criteria for Outsider-Secure Signcryption KEMs / 7.3.2: |
Security of the SKEM+DEM Construction / 7.3.3: |
Outsider-Secure Hybrid Signcryption in Practice / 7.3.4: |
Hybrid Signcryption with Insider Security / 7.4: |
From Outsider to Insider Security / 7.4.1: |
Signcryption Tag-KEMs / 7.4.2: |
Security Criteria for Signcryption Tag-KEMs / 7.4.3: |
Security of the SCTK+DEM Construction / 7.4.4: |
Insider-Secure Hybrid Signcryption in Practice / 7.4.5: |
Concealment and Its Applications to Authenticated Encryption / Yevgeniy Dodis8: |
Domain Extension of Authenticated Encryption / 8.1: |
Remotely Keyed Authenticated Encryption / 8.1.2: |
Definition of Concealment / 8.2: |
Security of Concealment / 8.2.1: |
Relaxed Concealments / 8.2.3: |
Super-Relaxed Concealments / 8.2.4: |
Comparison to Commitment / 8.2.5: |
Constructing Concealment Schemes / 8.3: |
Achieving Hiding / 8.3.1: |
Achieving Binding / 8.3.2: |
Necessity of Assumptions / 8.3.3: |
Applications to Authenticated Encryption / 8.4: |
Definition of Authenticated Encryption / 8.4.1: |
Authenticated Encryption of Long Messages / 8.4.2: |
Parallel Signcryption / Josef Pieprzyk ; David Pointcheval8.4.3: |
Concept of Parallel Signcryption / 9.1: |
Overview of Constructions / 9.3: |
Generic Parallel Signcryption / 9.4: |
Description of the Scheme / 9.4.1: |
Security Analysis / 9.4.2: |
Optimal Parallel Signcryption / 9.5: |
Extensions of Signcryption / 9.5.1: |
Identity-Based Signcryption / Xavier Boyen10: |
Identity-Based Cryptography / 10.1: |
Advantages and Disadvantages / 10.1.2: |
From IBE to Signcryption / 10.1.3: |
Specifying an IBSC System / 10.1.4: |
Concrete IBSC from Pairings / 10.1.5: |
The Identity-Based Signcryption Primitive / 10.2: |
Security Definitions / 10.3: |
Message Confidentiality / 10.3.1: |
Signature Non-repudiation / 10.3.2: |
Ciphertext Unlinkability / 10.3.3: |
Ciphertext Authentication / 10.3.4: |
Ciphertext Anonymity / 10.3.5: |
A Concrete IBSC Scheme / 10.4: |
The Boneh-Franklin Framework / 10.4.1: |
Fully Secure IBSC Construction / 10.4.2: |
A Performance/Security Trade-Off / 10.4.3: |
Signcrypting for Multiple Recipients / 10.4.4: |
Key Establishment Using Signcryption Techniques / 11: |
Formal Security Models for Key Establishment / 11.1: |
Motivation / 11.2.1: |
Sessions / 11.2.2: |
The Formal Security Model / 11.2.3: |
Entity Authentication / 11.2.4: |
Forward Secrecy / 11.2.5: |
Key Compromise Impersonation Attacks / 11.2.6: |
Notation / 11.2.7: |
Key Transport / 11.3: |
Key Establishment Based on Zheng's Signcryption Scheme / 11.4: |
Key Agreement Based on Signcryption KEMs / 11.5: |
Key Agreement Based on Signcryption Tag-KEMs / 11.5.1: |
Security Proof for the Bjørstad-Dent Protocol / 11.5.3: |
Key Establishment Based on Timestamps / 11.6: |
Applications of Signcryption / Yang Cui ; Goichiro Hanaoka12: |
Applications Fields of Signcryption / 12.1: |
Example Applications of Signcryption / 12.2: |
Secure Multicasting Over the Internet / 12.2.1: |
Authenticated Key Recovery / 12.2.2: |
Secure ATM Networks / 12.2.3: |
Secure Routing for Mobile Ad Hoc Networks / 12.2.4: |
Encrypted and Authenticated E-mail by Firewalls / 12.2.5: |
Signcryption in Secure VoIP / 12.2.6: |
Applications to Electronic Payment / 12.2.7: |
References |
Index |
Introduction / Yuliang Zheng1: |
Historical Development of Signcryption / 1.1: |
Coded Modulation / 1.1.1: |