Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > On the joint security of signature and encryption schemes under randomness reuse: Efficiency and security amplification
Publication

On the joint security of signature and encryption schemes under randomness reuse: Efficiency and security amplification

Title
On the joint security of signature and encryption schemes under randomness reuse: Efficiency and security amplification
Type
Article in International Conference Proceedings Book
Year
2012
Authors
Arriaga, A
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Farshim, P
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Conference proceedings International
Pages: 206-223
10th International Conference on Applied Cryptography and Network Security, ACNS 2012
Singapore, 26 June 2012 through 29 June 2012
Indexing
Other information
Authenticus ID: P-008-4P2
Abstract (EN): We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different cryptographic primitives. We find that through the additional binding introduced through randomness reuse, one can actually obtain a security amplification with respect to the standard black-box compositions, and achieve a stronger level of security. We introduce stronger notions of security for encryption and signatures, where challenge messages can depend in a restricted way on the random coins used in encryption, and show that two variants of the KEM/DEM paradigm give rise to encryption schemes that meet this enhanced notion of security. We obtain the most efficient signcryption scheme to date that is secure against insider attackers without random oracles. © 2012 Springer-Verlag.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation (2016)
Article in International Scientific Journal
Arriaga, A; Barbosa, M; Farshim, P
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation (2016)
Article in International Conference Proceedings Book
Arriaga, A; Barbosa, M; Farshim, P
Recommend this page Top
Copyright 1996-2025 © Faculdade de Belas Artes da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-11-11 at 21:36:15 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book