Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices (1510.01446v1)

Published 6 Oct 2015 in cs.CR

Abstract: Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use of the signature scheme of Liu et al., the second, named DKTUTS-CLSC-TKEM, is based on the direct key transport using a timestamp (DKTUTS) protocol first described by Zheng. In order to achieve greater efficiency both schemes are instantiated on elliptic curves without making use of pairings and are therefore good candidates for deployment on resource constrained devices.

Citations (2)

Summary

We haven't generated a summary for this paper yet.