close
1.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
2.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
3.

図書

図書
Masahiro Mambo, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 275 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1729
所蔵情報: loading…
目次情報: 続きを見る
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
Engineering an eCash System / Tim Ebringer ; Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control / Toru Nakanishi ; Nobuaki Haruna ; Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives / Marc Joye ; Narn-Yih Lee ; Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components / Khaled Khan ; Jun Han ; Yuliang Zheng
Methods for Protecting a Mobile Agent's Route / Dirk Westhoff ; Markus Schneider ; Claus Unger ; Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication / Hyung-Woo Lee ; Jung-Eun Kim ; Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer / Jorge Davila ; Javier Lopez ; Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree / Hiroaki Kikuchi ; Kensuke Abe ; Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks / Yuji Watanabe ; Hideki Imai
Digital Watermarking
Highly Robust Image Watermarking Using Complementary Modulations / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Region-Based Watermarking for Images / Gareth Brisbane ; Rei Safavi-Naini ; Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression / Hye-Joo Lee ; Ji-Hwan Park
Protection of Software and Data
Fingerprints for Copyright Software Protection / Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption / Sang Uk Shin ; Kyeong Seop Sim ; Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime / Tomas Sander ; Amnon Ta-Shma
On the Difficulty of Key Recovery Systems / Seungjoo Kim ; Insoo Lee ; Masahiro Mambo ; Sungjun Park
An Improvement on a Practical Secret Voting Scheme / Miyako Ohkubo ; Fumiaki Miura ; Masayuki Abe ; Atsushi Fujioka ; Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature / Khanh Nguyen ; Yi Mu ; Vijay Varadharajan
Extended Proxy Signatures for Smart Cards / Takeshi Okamoto ; Mitsuru Tada ; Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures / Tsuyoshi Nishioka ; Goichiro Hanaoka
Cryptanalysis of Two Group Signature Schemes
Author Index
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
4.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1998  xi, 262 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1431
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
Overview of elliptic curve cryptography / Kiyomichi Araki ; Takakazu Satoh ; Shinji Miura
Special Talk
Lattices and cryptography: An overview / Jacques Stern
Regular Contributions
A signcryption scheme with signature directly verifiable by public key / Feng Bao ; Robert H. Deng
Guaranteed correct sharing of integer factorization with off-line shareholders / Wenbo Mao
Lower bounds on term-based divisible cash systems / Tatsuaki Okamoto
Certifying trust / Ilari Lehti ; Pekka Nikander
On the security of server-aided RSA protocols / Johannes Merkle ; Ralph Werchner
On the security of ElGamal-based encryption / Yiannis Tsiounis
An authenticated Diffie-Hellman key agreement protocol secure against active attacks / Shouichi Hirose ; Susumu Yoshida
On the security of Girault's identification scheme / Shahrokh Saeednia ; Rei Safavi-Naini
A scheme for obtaining a message from the digital multisignature / Chin-Chen Chang ; Jyh-Jong Leu ; Pai-Cheng Huang ; Wei-Bin Lee
Secure hyperelliptic cryptosystems and their performance / Yasuyuki Sakai ; Kouichi Sakurai ; Hirokazu Ishizuka
A practical implementation of elliptic curve cryptosystems over GF(p) on a 16 bit microcomputer / Toshio Hasegawa ; Junko Nakajima ; Mitsuru Matsui
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map / Jung Hee Cheon ; Sungmo Park ; Sangwoo Park ; Daeho Kim
Public-key cryptosystems using the modular group / Akihiro Yamamura
A cellular automaton based fast one-way hash function suitable for hardware implementation / Miodrag Mihaljević ; Yuliang Zheng ; Hideki Imai
A new hash function based on MDx-family and its application to MAC / Sang Uk Shin ; Kyung Hyune Rhee ; Dae Hyun Ryu ; Sang Jin Lee
Recent Results
Security issues for contactless smart cards / Michael W. David
Parameters for secure elliptic curve cryptosystem - improvements on Schoof's algorithm / Tetsuya Izu ; Jun Kogure ; Masayuki Noro ; Kazuhiro Yokoyama
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme / Masahiro Mambo ; Hiroki Shizuya
Author Index
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
5.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1560
所蔵情報: loading…
目次情報: 続きを見る
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
Anonymous Fingerprinting Based on Committed Oblivious Transfer / Josep Domingo-Ferrer
How to Enhance the Security of Public-Key Encryption at Minimum Cost / Eiichiro Fujisaki ; Tatsuaki Okamoto
Encrypted Message Authentication by Firewalls / Chandana Gamage ; Jussipekka Leiwo ; Yuliang Zheng
A Relationship between One-Wayness and Correlation Intractability / Satoshi Hada ; Toshiaki Tanaka
Message Recovery Fair Blind Signature / Hyung-Woo Lee ; Tai-Yun Kim
On Quorum Controlled Asymmetric Proxy Re-encryption / Markus Jakobsson
Mini-Cash: A Minimalistic Approach to E-Commerce
Preserving Privacy in Distributed Delegation with Fast Certificates / Pekka Nikander ; Yki Kortesniemi ; Jonna Partanen
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol / Simon Blake-Wilson ; Alfred Menezes
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography - / Shingo Miyazaki ; Ikuko Kuroda ; Kouichi Sakurai
How to Copyright a Function ? / David Naccache ; Adi Shamir ; Julien P. Stern
On the Security of RSA Screening
The Effectiveness of Lattice Attacks Against Low-Exponent RSA / Christophe Coupé ; Phong Nguyen ; Jacques Stern
A Trapdoor Permutation Equivalent to Factoring / Pascal Paillier
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Evaluating Differential Fault Analysis of Unknown Cryptosystems
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project / Montse Rubia ; Juan Carlos Cruellas ; Manel Medina
Hash Functions and the MAC Using All-or-Nothing Property / Sang Uk Shin ; Kyung Hyune Rhee ; Jae Woo Yoon
Decision Oracles are Equivalent to Matching Oracles / Helena Handschuh ; Yiannis Tsiounis ; Moti Yung
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret / Yuji Watanabe ; Hideki Imai
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy / Adam Young
A Secure Pay-per-View Scheme for Web-Based Video Service / Jianying Zhou ; Kwok-Yan Lam
Author Index
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
6.

図書

図書
Jennifer Seberry, Yuliang Zheng, (eds.)
出版情報: Berlin ; New York : Springer-Verlag, c1993  xiii, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 718
所蔵情報: loading…
7.

電子ブック

EB
Alexander W.; Zheng, Yuliang; Young, Moti Dent, Alexander W. Dent, Yuliang Zheng
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
Musings on Blending / 1.1.2:
Signcryption / 1.1.3:
Provably Secure Signcryption / 1.1.4:
Extensions, Standardization, and Future Research Directions / 1.2:
Notation and Security Notions / 1.3:
Algorithms and Assignment / 1.3.1:
Signature Schemes / 1.3.2:
Public Key Encryption / 1.3.3:
Symmetric Encryption / 1.3.4:
Message Authentication Codes / 1.3.5:
Security Models for Signcryption / Part I:
Security for Signcryption: The Two-User Model / Jee Hea An ; Tal Rabin2:
Definition of Signcryption in the Two-User Setting / 2.1:
Two Security Notions in the Two-User Setting / 2.2.1:
Discussions on the Security Notions / 2.2.2:
Generic Compositions of Signature and Encryption / 2.3:
Construction / 2.3.1:
Security of the Parallel Composition Method / 2.3.2:
Security of the Sequential Composition Methods / 2.3.3:
Multi-user Setting / 2.4:
Syntax / 2.4.1:
Security / 2.4.2:
Extending Signcryption / 2.4.3:
Security for Signcryption: The Multi-User Model / Joonsang Baek ; Ron Steinfeld3:
The BSZ Model / 3.1:
Confidentiality of Signcryption in the Multi-User BSZ Model / 3.2.1:
Unforgeability of Signcryption in the Multi-User BSZ Model / 3.2.2:
Further Discussions on the Multi-User BSZ Model / 3.2.3:
Example: The Security of Zheng's Signcryption Scheme in the BSZ Model / 3.3:
Signcryption Schemes / Part II:
Signcryption Schemes Based on the Diffie-Hellman Problem / Paulo S.L.M. Barreto ; Benoît Libert ; Noel McCullagh ; Jean-Jacques Quisquater4:
Diffie-Hellman Problems / 4.1:
Zheng's Construction and Its Variants / 4.3:
Zheng's Original Scheme / 4.3.1:
The Bao-Deng Modification / 4.3.2:
A Modification with Public Verifiability / 4.3.3:
An Encrypt-then-Sign Composition / 4.4:
A Scheme with Unforgeability Based on Factoring / 4.5:
Schemes with Non-repudiation / 4.6:
A DSA-Based Construction / 4.6.1:
A Scheme Built on Schnorr's Signature Scheme / 4.6.2:
The CM Scheme / 4.7:
Signcryption Schemes Based on Bilinear Maps / 5:
Bilinear Map Groups / 5.1:
Assumptions / 5.3:
Signcryption for Anonymous Communications / 5.4:
Message Privacy / 5.4.1:
Ciphertext Unforgeability and Signature Unforgeability / 5.4.2:
Anonymity / 5.4.3:
A Tightly Secure Scheme / 5.5:
The Scheme / 5.5.1:
Efficiency / 5.5.2:
A Scheme with Short Detachable Signatures / 5.5.3:
Anonymous Communications / 5.6.1:
Signcryption Schemes Based on the RSA Problem / Alexander W. Dent ; John Malone-Lee5.6.3:
The RSA Transform / 6.1:
Dedicated RSA-Based Signcryption Schemes / 6.3:
Signcryption from Padding Schemes / 6.4:
Trapdoor Permutations / 6.4.1:
Extractable Commitments / 6.4.2:
Padding-Based Signcryption Schemes / 6.4.3:
Proof Intuition / 6.4.4:
Signcryption Based on RSA-TBOS / 6.5:
The TBOS Construction / 6.5.1:
Security Proof for the TBOS Signcryption Scheme / 6.5.2:
Construction Techniques / Part III:
Hybrid Signcryption / Tor E. Bjørstad7:
Background / 7.1:
A Brief Word on Notation / 7.1.1:
Preliminaries / 7.2:
The Hybrid Framework / 7.2.1:
Security Criteria for Data Encapsulation Mechanisms / 7.2.2:
Hybrid Signcryption with Outsider Security / 7.3:
An Outsider-Secure Signcryption KEM / 7.3.1:
Security Criteria for Outsider-Secure Signcryption KEMs / 7.3.2:
Security of the SKEM+DEM Construction / 7.3.3:
Outsider-Secure Hybrid Signcryption in Practice / 7.3.4:
Hybrid Signcryption with Insider Security / 7.4:
From Outsider to Insider Security / 7.4.1:
Signcryption Tag-KEMs / 7.4.2:
Security Criteria for Signcryption Tag-KEMs / 7.4.3:
Security of the SCTK+DEM Construction / 7.4.4:
Insider-Secure Hybrid Signcryption in Practice / 7.4.5:
Concealment and Its Applications to Authenticated Encryption / Yevgeniy Dodis8:
Domain Extension of Authenticated Encryption / 8.1:
Remotely Keyed Authenticated Encryption / 8.1.2:
Definition of Concealment / 8.2:
Security of Concealment / 8.2.1:
Relaxed Concealments / 8.2.3:
Super-Relaxed Concealments / 8.2.4:
Comparison to Commitment / 8.2.5:
Constructing Concealment Schemes / 8.3:
Achieving Hiding / 8.3.1:
Achieving Binding / 8.3.2:
Necessity of Assumptions / 8.3.3:
Applications to Authenticated Encryption / 8.4:
Definition of Authenticated Encryption / 8.4.1:
Authenticated Encryption of Long Messages / 8.4.2:
Parallel Signcryption / Josef Pieprzyk ; David Pointcheval8.4.3:
Concept of Parallel Signcryption / 9.1:
Overview of Constructions / 9.3:
Generic Parallel Signcryption / 9.4:
Description of the Scheme / 9.4.1:
Security Analysis / 9.4.2:
Optimal Parallel Signcryption / 9.5:
Extensions of Signcryption / 9.5.1:
Identity-Based Signcryption / Xavier Boyen10:
Identity-Based Cryptography / 10.1:
Advantages and Disadvantages / 10.1.2:
From IBE to Signcryption / 10.1.3:
Specifying an IBSC System / 10.1.4:
Concrete IBSC from Pairings / 10.1.5:
The Identity-Based Signcryption Primitive / 10.2:
Security Definitions / 10.3:
Message Confidentiality / 10.3.1:
Signature Non-repudiation / 10.3.2:
Ciphertext Unlinkability / 10.3.3:
Ciphertext Authentication / 10.3.4:
Ciphertext Anonymity / 10.3.5:
A Concrete IBSC Scheme / 10.4:
The Boneh-Franklin Framework / 10.4.1:
Fully Secure IBSC Construction / 10.4.2:
A Performance/Security Trade-Off / 10.4.3:
Signcrypting for Multiple Recipients / 10.4.4:
Key Establishment Using Signcryption Techniques / 11:
Formal Security Models for Key Establishment / 11.1:
Motivation / 11.2.1:
Sessions / 11.2.2:
The Formal Security Model / 11.2.3:
Entity Authentication / 11.2.4:
Forward Secrecy / 11.2.5:
Key Compromise Impersonation Attacks / 11.2.6:
Notation / 11.2.7:
Key Transport / 11.3:
Key Establishment Based on Zheng's Signcryption Scheme / 11.4:
Key Agreement Based on Signcryption KEMs / 11.5:
Key Agreement Based on Signcryption Tag-KEMs / 11.5.1:
Security Proof for the Bjørstad-Dent Protocol / 11.5.3:
Key Establishment Based on Timestamps / 11.6:
Applications of Signcryption / Yang Cui ; Goichiro Hanaoka12:
Applications Fields of Signcryption / 12.1:
Example Applications of Signcryption / 12.2:
Secure Multicasting Over the Internet / 12.2.1:
Authenticated Key Recovery / 12.2.2:
Secure ATM Networks / 12.2.3:
Secure Routing for Mobile Ad Hoc Networks / 12.2.4:
Encrypted and Authenticated E-mail by Firewalls / 12.2.5:
Signcryption in Secure VoIP / 12.2.6:
Applications to Electronic Payment / 12.2.7:
References
Index
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
8.

電子ブック

EB
International Conference on the Theory and Application of Cryptology and Information Security, Yuliang Zheng
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
9.

電子ブック

EB
AUSCRYPT '92, Jennifer Seberry, Yuliang Zheng, International Association for Cryptologic Research.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 1993
所蔵情報: loading…
10.

電子ブック

EB
Alexander W.; Zheng, Yuliang; Young, Moti Dent, Alexander W. Dent, Yuliang Zheng, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
Musings on Blending / 1.1.2:
Signcryption / 1.1.3:
Provably Secure Signcryption / 1.1.4:
Extensions, Standardization, and Future Research Directions / 1.2:
Notation and Security Notions / 1.3:
Algorithms and Assignment / 1.3.1:
Signature Schemes / 1.3.2:
Public Key Encryption / 1.3.3:
Symmetric Encryption / 1.3.4:
Message Authentication Codes / 1.3.5:
Security Models for Signcryption / Part I:
Security for Signcryption: The Two-User Model / Jee Hea An ; Tal Rabin2:
Definition of Signcryption in the Two-User Setting / 2.1:
Two Security Notions in the Two-User Setting / 2.2.1:
Discussions on the Security Notions / 2.2.2:
Generic Compositions of Signature and Encryption / 2.3:
Construction / 2.3.1:
Security of the Parallel Composition Method / 2.3.2:
Security of the Sequential Composition Methods / 2.3.3:
Multi-user Setting / 2.4:
Syntax / 2.4.1:
Security / 2.4.2:
Extending Signcryption / 2.4.3:
Security for Signcryption: The Multi-User Model / Joonsang Baek ; Ron Steinfeld3:
The BSZ Model / 3.1:
Confidentiality of Signcryption in the Multi-User BSZ Model / 3.2.1:
Unforgeability of Signcryption in the Multi-User BSZ Model / 3.2.2:
Further Discussions on the Multi-User BSZ Model / 3.2.3:
Example: The Security of Zheng's Signcryption Scheme in the BSZ Model / 3.3:
Signcryption Schemes / Part II:
Signcryption Schemes Based on the Diffie-Hellman Problem / Paulo S.L.M. Barreto ; Benoît Libert ; Noel McCullagh ; Jean-Jacques Quisquater4:
Diffie-Hellman Problems / 4.1:
Zheng's Construction and Its Variants / 4.3:
Zheng's Original Scheme / 4.3.1:
The Bao-Deng Modification / 4.3.2:
A Modification with Public Verifiability / 4.3.3:
An Encrypt-then-Sign Composition / 4.4:
A Scheme with Unforgeability Based on Factoring / 4.5:
Schemes with Non-repudiation / 4.6:
A DSA-Based Construction / 4.6.1:
A Scheme Built on Schnorr's Signature Scheme / 4.6.2:
The CM Scheme / 4.7:
Signcryption Schemes Based on Bilinear Maps / 5:
Bilinear Map Groups / 5.1:
Assumptions / 5.3:
Signcryption for Anonymous Communications / 5.4:
Message Privacy / 5.4.1:
Ciphertext Unforgeability and Signature Unforgeability / 5.4.2:
Anonymity / 5.4.3:
A Tightly Secure Scheme / 5.5:
The Scheme / 5.5.1:
Efficiency / 5.5.2:
A Scheme with Short Detachable Signatures / 5.5.3:
Anonymous Communications / 5.6.1:
Signcryption Schemes Based on the RSA Problem / Alexander W. Dent ; John Malone-Lee5.6.3:
The RSA Transform / 6.1:
Dedicated RSA-Based Signcryption Schemes / 6.3:
Signcryption from Padding Schemes / 6.4:
Trapdoor Permutations / 6.4.1:
Extractable Commitments / 6.4.2:
Padding-Based Signcryption Schemes / 6.4.3:
Proof Intuition / 6.4.4:
Signcryption Based on RSA-TBOS / 6.5:
The TBOS Construction / 6.5.1:
Security Proof for the TBOS Signcryption Scheme / 6.5.2:
Construction Techniques / Part III:
Hybrid Signcryption / Tor E. Bjørstad7:
Background / 7.1:
A Brief Word on Notation / 7.1.1:
Preliminaries / 7.2:
The Hybrid Framework / 7.2.1:
Security Criteria for Data Encapsulation Mechanisms / 7.2.2:
Hybrid Signcryption with Outsider Security / 7.3:
An Outsider-Secure Signcryption KEM / 7.3.1:
Security Criteria for Outsider-Secure Signcryption KEMs / 7.3.2:
Security of the SKEM+DEM Construction / 7.3.3:
Outsider-Secure Hybrid Signcryption in Practice / 7.3.4:
Hybrid Signcryption with Insider Security / 7.4:
From Outsider to Insider Security / 7.4.1:
Signcryption Tag-KEMs / 7.4.2:
Security Criteria for Signcryption Tag-KEMs / 7.4.3:
Security of the SCTK+DEM Construction / 7.4.4:
Insider-Secure Hybrid Signcryption in Practice / 7.4.5:
Concealment and Its Applications to Authenticated Encryption / Yevgeniy Dodis8:
Domain Extension of Authenticated Encryption / 8.1:
Remotely Keyed Authenticated Encryption / 8.1.2:
Definition of Concealment / 8.2:
Security of Concealment / 8.2.1:
Relaxed Concealments / 8.2.3:
Super-Relaxed Concealments / 8.2.4:
Comparison to Commitment / 8.2.5:
Constructing Concealment Schemes / 8.3:
Achieving Hiding / 8.3.1:
Achieving Binding / 8.3.2:
Necessity of Assumptions / 8.3.3:
Applications to Authenticated Encryption / 8.4:
Definition of Authenticated Encryption / 8.4.1:
Authenticated Encryption of Long Messages / 8.4.2:
Parallel Signcryption / Josef Pieprzyk ; David Pointcheval8.4.3:
Concept of Parallel Signcryption / 9.1:
Overview of Constructions / 9.3:
Generic Parallel Signcryption / 9.4:
Description of the Scheme / 9.4.1:
Security Analysis / 9.4.2:
Optimal Parallel Signcryption / 9.5:
Extensions of Signcryption / 9.5.1:
Identity-Based Signcryption / Xavier Boyen10:
Identity-Based Cryptography / 10.1:
Advantages and Disadvantages / 10.1.2:
From IBE to Signcryption / 10.1.3:
Specifying an IBSC System / 10.1.4:
Concrete IBSC from Pairings / 10.1.5:
The Identity-Based Signcryption Primitive / 10.2:
Security Definitions / 10.3:
Message Confidentiality / 10.3.1:
Signature Non-repudiation / 10.3.2:
Ciphertext Unlinkability / 10.3.3:
Ciphertext Authentication / 10.3.4:
Ciphertext Anonymity / 10.3.5:
A Concrete IBSC Scheme / 10.4:
The Boneh-Franklin Framework / 10.4.1:
Fully Secure IBSC Construction / 10.4.2:
A Performance/Security Trade-Off / 10.4.3:
Signcrypting for Multiple Recipients / 10.4.4:
Key Establishment Using Signcryption Techniques / 11:
Formal Security Models for Key Establishment / 11.1:
Motivation / 11.2.1:
Sessions / 11.2.2:
The Formal Security Model / 11.2.3:
Entity Authentication / 11.2.4:
Forward Secrecy / 11.2.5:
Key Compromise Impersonation Attacks / 11.2.6:
Notation / 11.2.7:
Key Transport / 11.3:
Key Establishment Based on Zheng's Signcryption Scheme / 11.4:
Key Agreement Based on Signcryption KEMs / 11.5:
Key Agreement Based on Signcryption Tag-KEMs / 11.5.1:
Security Proof for the Bjørstad-Dent Protocol / 11.5.3:
Key Establishment Based on Timestamps / 11.6:
Applications of Signcryption / Yang Cui ; Goichiro Hanaoka12:
Applications Fields of Signcryption / 12.1:
Example Applications of Signcryption / 12.2:
Secure Multicasting Over the Internet / 12.2.1:
Authenticated Key Recovery / 12.2.2:
Secure ATM Networks / 12.2.3:
Secure Routing for Mobile Ad Hoc Networks / 12.2.4:
Encrypted and Authenticated E-mail by Firewalls / 12.2.5:
Signcryption in Secure VoIP / 12.2.6:
Applications to Electronic Payment / 12.2.7:
References
Index
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼