You are looking at a specific version 20120323:201628 of this paper.
See the latest version.
Paper 2012/154
The Joint Signature and Encryption Revisited
Laila El Aimani
Abstract
We study the Sign\_then\_Encrypt, Commit\_then\_Encrypt\_and\_Sign, and Encrypt\_then\_Sign paradigms in the context of three cryptographic primitives, namely designated confirmer signatures, signcryption, and verifiably encrypted signatures. Our study identifies weaknesses in those paradigms which impose the use of expensive encryption (as a building block) in order to meet a reasonable security level. Next, we propose some optimizations which annihilate the found weaknesses and allow consequently cheap encryption without compromising the overall security. Our optimizations further enjoy verifiability, a property profoundly needed in many real-life applications of the studied primitives.
Metadata
- Available format(s)
- PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Sign\_then\_EncryptCommit\_then\_Encrypt\_and\_SignEncrypt\_then\_Sign(public) verifiabilitydesignated confirmer signaturessigncryptionverifiably encrypted signatureszero knowledge proofs.
- Contact author(s)
- laila elaimani @ yahoo fr
- History
- 2017-06-14: withdrawn
- 2012-03-23: received
- See all versions
- Short URL
- https://ia.cr/2012/154
- License
-
CC BY