Publication:
Combined schemes for signature and encryption: The public-key and the identity-based setting

Loading...
Thumbnail Image
Identifiers
Publication date
2016-04
Defense date
Advisors
Tutors
Journal Title
Journal ISSN
Volume Title
Publisher
Elsevier
Impact
Google Scholar
Export
Research Projects
Organizational Units
Journal Issue
Abstract
Consider a scenario in which parties use a public-key encryption scheme and a signature scheme with a single public key/private key pair-so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice, but from an efficiency point of view looks attractive. We offer security notions to analyze such violations of key separation. For both the identity-and the non-identity-based setting, we show that-although being insecure in general-for schemes of interest the resulting combined scheme can offer strong security guarantees.
Description
Keywords
Combined scheme, Identity-based cryptography, Key separation, Public-key cryptography
Bibliographic citation
González Vasco, M. I., Hess, F., & Steinwandt, R. (2016). Combined schemes for signature and encryption: The public-key and the identity-based setting. Information and Computation, 247, 1-10.