Skip to main content

Verifiable Composition of Signature and Encryption

A Comprehensive Study of the Design Paradigms

  • Book
  • © 2017

Overview

  • This book gives a thorough treatment of the celebrated compositions of signature and encryption
  • The text takes an instructive approach to analyze and explain the shortcomings of the existing paradigms used to build many cryptographic primitives
  • The author endeavors to gradually supplement and reinforce the security model in which the primitives are being analyzed

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (10 chapters)

  1. Background

  2. The “Sign_then_Encrypt” (StE) Paradigm

  3. The “Commit_then_Encrypt_and_Sign” (CtEaS) Paradigm

  4. New Paradigms

Keywords

About this book

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.

This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way.

This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

Authors and Affiliations

  • École Nationale des Sciences Appliquées de Safi, Cadi Ayyad University, Safi, Morocco

    Laila El Aimani

About the author

Laila El Aimani is researcher in cryptology and assistant professor at Cadi Ayyad University, Morocco.

In 2011, she graduated from Universität Bonn (Germany) as a Dr.rer.nat under the supervision of Joachim von zur Gathen. A good part of her PhD research was dedicated to the design and analysis of privacy-preserving mechanisms (e.g. undeniable/confirmer signatures, signcryption).


Later, she joined the Security Labs of Technicolor (France) as a research engineer in security and privacy. After a short sojourn in Gemalto (France) in 2013, she joined the computer science department of Cadi Ayyad University (Morocco) as a researcher and assistant professor.

Laila filed three patents on applied cryptology, and co-authored several research papers on cryptology/security.

Bibliographic Information

  • Book Title: Verifiable Composition of Signature and Encryption

  • Book Subtitle: A Comprehensive Study of the Design Paradigms

  • Authors: Laila El Aimani

  • DOI: https://doi.org/10.1007/978-3-319-68112-2

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing AG 2017

  • Hardcover ISBN: 978-3-319-68111-5Published: 06 November 2017

  • Softcover ISBN: 978-3-319-88551-3Published: 25 August 2018

  • eBook ISBN: 978-3-319-68112-2Published: 27 October 2017

  • Edition Number: 1

  • Number of Pages: XX, 148

  • Number of Illustrations: 29 b/w illustrations, 5 illustrations in colour

  • Topics: Data Structures and Information Theory, Mathematics of Computing

Publish with us