Skip to main content
  • Book
  • © 2010

Practical Signcryption

  • First book on this topic
  • The second editor invented the term "Signcryption"
  • A comprehensive treatment, suitable as a handbook on the subject
  • Includes supplementary material: sn.pub/extras

Part of the book series: Information Security and Cryptography (ISC)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 chapters)

  1. Front Matter

    Pages i-xviii
  2. Introduction

    • Yuliang Zheng
    Pages 1-18
  3. Security Models for Signcryption

    1. Front Matter

      Pages 19-19
    2. Security for Signcryption: The Two-User Model

      • Jee Hea An, Tal Rabin
      Pages 21-42
    3. Security for Signcryption: The Multi-User Model

      • Joonsang Baek, Ron Steinfeld
      Pages 43-53
  4. Signcryption Schemes

    1. Front Matter

      Pages 55-55
    2. Signcryption Schemes Based on the Diffie–Hellman Problem

      • Paulo S.L.M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater
      Pages 57-69
    3. Signcryption Schemes Based on Bilinear Maps

      • Paulo S.L.M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater
      Pages 71-97
    4. Signcryption Schemes Based on the RSA Problem

      • Alexander W. Dent, John Malone-Lee
      Pages 99-117
  5. Construction Techniques

    1. Front Matter

      Pages 119-119
    2. Hybrid Signcryption

      • Tor E. Bjørstad
      Pages 121-147
    3. Parallel Signcryption

      • Josef Pieprzyk, David Pointcheval
      Pages 175-192
  6. Extensions of Signcryption

    1. Front Matter

      Pages 193-193
    2. Identity-Based Signcryption

      • Xavier Boyen
      Pages 195-216
    3. Key Establishment Using Signcryption Techniques

      • Alexander W. Dent
      Pages 217-240
    4. Applications of Signcryption

      • Yang Cui, Goichiro Hanaoka
      Pages 241-256
  7. Back Matter

    Pages 257-274

About this book

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the “encrypt-then-sign” method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

Reviews

From the reviews:

“In this book, editors Dent and Zheng consolidate the research work done for the advancement of signcryption technology. … The book is primarily intended for communication design engineers, communication system analysts, and security analysts, as well as enthusiastic researchers at large.” (Zubair Baig, ACM Computing Reviews, July, 2011)

Editors and Affiliations

  • University of London, Information Security Group, Royal Holloway, Egham, Surrey, United Kingdom

    Alexander W. Dent

  • Dept. Software & Information Systems, University of North Carolina, Charlotte, Charlotte, USA

    Yuliang Zheng

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access