Aimani, Laila El
Verifiable Composition of Signature and Encryption
Part I. Background
1. Preliminaries
Laila El Aimani
2. Case-Study Primitives
Laila El Aimani
Part II. The “Sign_then_Encrypt” (StE) Paradigm
3. Analysis of StE
Laila El Aimani
4. An Efficient Variant of StE
Laila El Aimani
Part III. The “Commit_then_Encrypt_and_Sign” (CtEaS) Paradigm
5. Analysis of CtEaS
Laila El Aimani
6. CtEtS: An Efficient Variant of CtEaS
Laila El Aimani
Part IV. New Paradigms
7. EtStE: A New Paradigm for Verifiable Signcryption
Laila El Aimani
8. Multi-User Security
Laila El Aimani
9. Insider Privacy
Laila El Aimani
10. Wrap-Up
Laila El Aimani
Keywords: Computer Science, Data Structures, Cryptology and Information Theory, Mathematics of Computing
- Author(s)
- Aimani, Laila El
- Publisher
- Springer
- Publication year
- 2017
- Language
- en
- Edition
- 1
- Page amount
- 20 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783319681122
- Printed ISBN
- 978-3-319-68111-5