Hybrid Cryptography

Alexander W. Dent

Abstract

This paper examines the methods in which the ideas behind a KEM--DEM hybrid encryption scheme can be extended to other types of asymmetric primitives, particularly to signcryption schemes. The central principle is a keyed symmetric algorithm can be used to provide a security service for in an asymmetric algorithm provided that that symmetric primitive is under the control of the asymmetric part of the cipher (say, if asymmetric techniques are used to generate the key that the symmetric primitive uses). This theory is applied to signcryption schemes with outsider security and an efficient, provably secure scheme, termed ECISS-KEM, is proposed. The theory is also applied to signature schemes, where it is shown that efficient hybrid signature schemes can never exist, and to signcryption schemes with insider security, where it is shown that several existing schemes can be considered hybrid signcryption schemes.

Note: 08/04 -- Minor errors corrected.<BR> 11/04 -- Proof errors corrected.

Available format(s)
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
elliptic curve cryptosystemhybrid cipher
Contact author(s)
a dent @ rhul ac uk
History
2009-01-03: last of 5 revisions
See all versions
Short URL
https://ia.cr/2004/210

CC BY

BibTeX

@misc{cryptoeprint:2004/210,
author = {Alexander W.  Dent},
title = {Hybrid Cryptography},
howpublished = {Cryptology ePrint Archive, Paper 2004/210},
year = {2004},
note = {\url{https://eprint.iacr.org/2004/210}},
url = {https://eprint.iacr.org/2004/210}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.