Abstract
Among the panoply of cryptographic applications that erupted with the electronic era, we confined ourselves to the study of applications that require integrity and authenticity of the transmitted data, in addition to confidentiality combined with the possibility of proving given properties about the hidden information. Our study was conducted in the context of two cryptographic primitives, namely confirmer signatures and signcryption. However, we expect the approach to be extended, at least partially, to further cryptographic systems that hinge upon digital signatures and verifiable encryption. In this summary, we highlight the key steps of our work that are likely to occur when studying the aforementioned systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
El Aimani, L. (2017). Wrap-Up. In: Verifiable Composition of Signature and Encryption. Springer, Cham. https://doi.org/10.1007/978-3-319-68112-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-68112-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68111-5
Online ISBN: 978-3-319-68112-2
eBook Packages: Computer ScienceComputer Science (R0)