Text
Practical Signcryption
Table of contents :
Introduction
Security for Signcryption: The Two-User Model
Security for Signcryption: The Multi-User Model
Signcryption Schemes Based on the Diffie–Hellman Problem
Signcryption Schemes Based on Bilinear Maps
Signcryption Schemes Based on the RSA Problem
Hybrid Signcryption
Concealment and Its Applications to Authenticated Encryption
Parallel Signcryption
Identity-Based Signcryption
Key Establishment Using Signcryption Techniques
Applications of Signcryption
No other version available