Signcryption Saves Computational and Communicational Costs

نویسنده

  • Laura Savu
چکیده

The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption and the practical application of signcryption in real life. Because the elliptic curve cryptography became the newest and most efficient method for public key cryptography, it is included in this paper the implementation of signcryption scheme for elliptic curves. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Schnorr Digital Signature in Signcryption Scheme

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...

متن کامل

Combining Public Key Encryption with Schnorr Digital Signature

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...

متن کامل

A Review of Elliptic Curve based Signcryption Schemes

Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...

متن کامل

Robust Delegation Signcrypted Authentication Protocol against FHLR Attack in 3GPP Wireless Communications

In this paper, we propose a new Robust Delegation Signcrypted Authentication Protocol (RD-SAP) against the False Home Location Register Attack in 3GPP. The proposed authentication protocol is based on Public Key Signcryption technique to solve the problem of FHLR attack on Tian F Lee protocol and which provides the user identity privacy, mutual authentication, nonrepudiation. This study also pr...

متن کامل

Cryptanalysis of an Identity Based Signcryption Scheme without Random Oracles

Signcryption is a cryptographic primitive that aims at providing confidentiality and the sender’s identity authentication in a logic step, at lower computational costs and communication overheads than sign-then-encrypt way. Recently, Yu et al.[1] proposed a new identity based signcryption scheme in standard model. However, in this paper, we show that the scheme still has some security weaknesse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011