Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/38986

Registo completo
Campo DCValorIdioma
dc.contributor.authorArriaga, Afonsopor
dc.contributor.authorBarbosa, Manuelpor
dc.contributor.authorFarshim, Pooyapor
dc.date.accessioned2015-12-15T10:20:23Z-
dc.date.available2015-12-15T10:20:23Z-
dc.date.issued2012-
dc.identifier.isbn978-3-642-31283-0-
dc.identifier.issn0302-9743por
dc.identifier.urihttps://hdl.handle.net/1822/38986-
dc.descriptionLecture Notes in Computer Science, 7341por
dc.description.abstractWe extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different cryptographic primitives. We find that through the additional binding introduced through randomness reuse, one can actually obtain a security amplification with respect to the standard black-box compositions, and achieve a stronger level of security. We introduce stronger notions of security for encryption and signatures, where challenge messages can depend in a restricted way on the random coins used in encryption, and show that two variants of the KEM/DEM paradigm give rise to encryption schemes that meet this enhanced notion of security. We obtain the most efficient signcryption scheme to date that is secure against insider attackers without random oracles.por
dc.description.sponsorship(undefined)por
dc.language.isoengpor
dc.publisherSpringerpor
dc.rightsopenAccesspor
dc.subjectSigncryptionpor
dc.subjectInsider securitypor
dc.subjectRandomness reusepor
dc.titleOn the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplificationpor
dc.typeconferencePaperpor
dc.peerreviewedyespor
dc.relation.publisherversionhttp://link.springer.com/chapter/10.1007%2F978-3-642-31284-7_13por
sdum.publicationstatuspublishedpor
oaire.citationStartPage206por
oaire.citationEndPage223por
oaire.citationConferencePlaceSingaporepor
oaire.citationTitle10th International Conference on Applied Cryptography and Network Securitypor
oaire.citationVolume7341 LNCSpor
dc.identifier.doi10.1007/978-3-642-31284-7_13por
sdum.journalLecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)por
sdum.conferencePublication10th International Conference on Applied Cryptography and Network Securitypor
Aparece nas coleções:HASLab - Artigos em atas de conferências internacionais (texto completo)

Ficheiros deste registo:
Ficheiro TamanhoFormato 
781.pdf387,85 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID