You are looking at a specific version 20120323:201628 of this paper. See the latest version.

Paper 2012/154

The Joint Signature and Encryption Revisited

Laila El Aimani

Abstract

We study the Sign\_then\_Encrypt, Commit\_then\_Encrypt\_and\_Sign, and Encrypt\_then\_Sign paradigms in the context of three cryptographic primitives, namely designated confirmer signatures, signcryption, and verifiably encrypted signatures. Our study identifies weaknesses in those paradigms which impose the use of expensive encryption (as a building block) in order to meet a reasonable security level. Next, we propose some optimizations which annihilate the found weaknesses and allow consequently cheap encryption without compromising the overall security. Our optimizations further enjoy verifiability, a property profoundly needed in many real-life applications of the studied primitives.

Metadata
Available format(s)
PDF PS
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Sign\_then\_EncryptCommit\_then\_Encrypt\_and\_SignEncrypt\_then\_Sign(public) verifiabilitydesignated confirmer signaturessigncryptionverifiably encrypted signatureszero knowledge proofs.
Contact author(s)
laila elaimani @ yahoo fr
History
2017-06-14: withdrawn
2012-03-23: received
See all versions
Short URL
https://ia.cr/2012/154
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.