{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:59:57Z","timestamp":1742921997083,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540894094"},{"type":"electronic","value":"9783540894117"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-540-89411-7_7","type":"book-chapter","created":{"date-parts":[[2010,11,10]],"date-time":"2010-11-10T12:16:35Z","timestamp":1289391395000},"page":"121-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid Signcryption"],"prefix":"10.1007","author":[{"given":"Tor E.","family":"Bj\u00f8rstad","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In D. Naccache, editor, Progress in Cryptology \u2013 CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 143\u2013158. Springer, 2001.","DOI":"10.1007\/3-540-45353-9_12"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00145-007-9010-x","volume":"21","author":"M. Abe","year":"2008","unstructured":"M. Abe, R. Gennaro, and K. Karosawa. Tag-KEM\/DEM: A new framework for hybrid encryption. Journal of Cryptology, 21(1):97\u2013130, 2008.","journal-title":"Journal of Cryptology"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"M. Abe, R. Gennaro, K. Karosawa, and V. Shoup. Tag-KEM\/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa\u2013Desmedt KEM. In R. Cramer, editor, Advance in Cryptology \u2013 Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 128\u2013146. Springer, 2005.","DOI":"10.1007\/11426639_8"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"J. H. An, Y. Dodis, and T. Rabin. On the security of joint signatures and encryption. In L. Knudsen, editor, Advances in Cryptology \u2013 Eurocrypt 2002, volume 2332 of Lecture Notes in Computer Science, pages 83\u2013107. Springer, 2002.","DOI":"10.1007\/3-540-46035-7_6"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. In D. Naccache and P. Paillier, editors, Public Key Cryptography (PKC 2002), volume 2274 of Lecture Notes in Computer Science, pages 80\u201398. Springer, 2002.","DOI":"10.1007\/3-540-45664-3_6"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s00145-007-0211-0","volume":"20","author":"J. Baek","year":"2007","unstructured":"J. Baek, R. Steinfeld, and Y. Zheng. Formal proofs for the security of signcryption. Journal of Cryptology, 20(2):203\u2013235, 2007.","journal-title":"Journal of Cryptology"},{"key":"7_CR36","unstructured":"T. E. Bj\u00f8rstad. Provable security of signcryption. Master\u2019s thesis, Norwegian University of Technology and Science, 2005. Available from http:\/\/www.ii.uib.no\/\u223ctor\/pdf\/msc_thesis.pdf."},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"T. E. Bj\u00f8rstad and A. W. Dent. Building better signcryption schemes with tag-KEMs. In M. Yung, Y. Dodis, A. Kiayas, and T. Malkin, editors, Public Key Cryptography \u2013 PKC 2006, volume 3958 of Lecture Notes in Computer Science, pages 491\u2013507. Springer, 2006.","DOI":"10.1007\/11745853_32"},{"issue":"1","key":"7_CR68","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2004","unstructured":"R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1): 167\u2013226, 2004.","journal-title":"SIAM Journal on Computing"},{"key":"7_CR71","unstructured":"A. W. Dent. Hybrid cryptography. Available from http:\/\/eprint.iacr.org\/2004\/210\/, 2004."},{"key":"7_CR72","doi-asserted-by":"crossref","unstructured":"A. W. Dent. Hybrid signcryption schemes with insider security (extended abstract). In C. Boyd and J. Gonzalez, editors, Proceedings of the 10th Australasian Conference in Information Security and Privacy \u2013 ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 253\u2013266. Springer, 2005.","DOI":"10.1007\/11506157_22"},{"key":"7_CR73","doi-asserted-by":"crossref","unstructured":"A. W. Dent. Hybrid signcryption schemes with outsider security (extended abstract). In J. Zhou and J. Lopez, editors, Proceedings of the 8th International Conference on Information Security \u2013 ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 203\u2013217. Springer, 2005.","DOI":"10.1007\/11556992_15"},{"key":"7_CR77","unstructured":"Y. Dodis, M. J. Freedman, S. Jarecki, and S. Walfish. Optimal signcryption from any trapdoor permutation. Available from http:\/\/eprint.iacr.org\/2004\/020, 2004."},{"key":"7_CR92","doi-asserted-by":"crossref","unstructured":"M. C. Gorantla, C. Boyd, and J. M. Gonz\u00e1lez Nieto. On the connection between signcryption and one-pass key establishment. In S. D. Galbraith, editor, Cryptography and Coding \u2013 Proceedings of the 11th IMA International Conference, volume 4887 of Lecture Notes in Computer Science, pages 277\u2013301. Springer, 2007.","DOI":"10.1007\/978-3-540-77272-9_17"},{"key":"7_CR101","unstructured":"International Organization for Standardization. ISO\/IEC 18033\u20132, Information technology \u2014 Security techniques \u2014 Encryption algorithms \u2014 Part 2: Asymmetric Ciphers, 2006."},{"issue":"1","key":"7_CR130","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10623-004-3806-6","volume":"37","author":"J. Malone-Lee","year":"2005","unstructured":"J. Malone-Lee. Signcryption with non-interactive non-repudiation. Designs, Codes and Cryptography, 37(1):81\u2013109, 2005.","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR167","doi-asserted-by":"crossref","unstructured":"P. Rogaway. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM Conference on Computer and Communications Security \u2013 ACM CCS 2002, pages 98\u2013107. ACM Press, 2002.","DOI":"10.1145\/586110.586125"},{"issue":"1","key":"7_CR200","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.entcs.2006.11.011","volume":"171","author":"M. Yoshida","year":"2007","unstructured":"M. Yoshida and T. Fujiwara. On the security of tag-KEM for signcryption. Electronic Notes in Theoretical Computer Science, 171(1):83\u201391, 2007.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"7_CR203","doi-asserted-by":"crossref","unstructured":"Y. Zheng. Digital signcryption or how to achieve cost(signature & encryption) \u00ab cost (signature) + cost(encryption). In B. S. Kaliski Jr., editor, Advances in Cryptology \u2013 Crypto \u201997, volume 1294 of Lecture Notes in Computer Science, pages 165\u2013179. Springer, 1997.","DOI":"10.1007\/BFb0052234"}],"container-title":["Information Security and Cryptography","Practical Signcryption"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89411-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T23:46:20Z","timestamp":1675727180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-89411-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783540894094","9783540894117"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89411-7_7","relation":{},"ISSN":["1619-7100"],"issn-type":[{"type":"print","value":"1619-7100"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"4 October 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}