Practical Signcryption

Preparing link to download Please wait... Download

E-Book Overview

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.


E-Book Content

Information Security and Cryptography Texts and Monographs Series Editors David Basin Ueli Maurer Advisory Board Martín Abadi Ross Anderson Michael Backes Ronald Cramer Virgil D. Gligor Oded Goldreich Joshua D. Guttman Arjen K. Lenstra John C. Mitchell Tatsuaki Okamoto Kenny Paterson Bart Preneel For further volumes: http://www.springer.com/series/4752 Alexander W. Dent · Yuliang Zheng Editors Practical Signcryption Foreword by Moti Yung 123 Editors Dr. Alexander W. Dent Royal Holloway University of London Information Security Group TW20 0EX Egham, Surrey United Kingdom [email protected] Prof. Yuliang Zheng University of North Carolina, Charlotte Dept. Software & Information Systems University City Blvd. 9201 Charlotte, NC 28223 USA [email protected] Series Editors Prof. Dr. David Basin Prof. Dr. Ueli Maurer ETH Zürich Switzerland [email protected] [email protected] ISSN 1619-7100 ISBN 978-3-540-89409-4 e-ISBN 978-3-540-89411-7 DOI 10.1007/978-3-540-89411-7 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2010935931 ACM Computing Classification (1998): E.3, K.4.4 c Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statem