Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem

نویسندگان

  • Yu-Fang Chung
  • Zhen Yu Wu
  • Feipei Lai
  • Tzer-Shyong Chen
چکیده

This study presents an anonymous signcryption scheme based on the elliptic curve cryptosystem, which combines the properties of elliptic curve cryptosystem and ring signature. While the signers are endowed with anonymity through the technique of ring signature, the elliptic curve cryptosystem achieves the advantages of high security, low computation load, and small bandwidth requirements. To integrate the advantages of these two applications, the resulting system reaches a highly secure and efficient anonymous signcryption scheme. Signcryption makes a session key unnecessary to be established in advance for each session; hence, transmission load is reduced, and efficiency of performance and transmission is enhanced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Modified Signcryption Scheme using Elliptic Curve Cryptography

In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted mess...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

Signcryption Approaches for Network Security

Signcryption is a new public key cryptography approach to combine digital signature and encryption functionalities as a consequence of the growing consumer demand for information security. The necessity to achieve confidentiality, integrity, authenticity and non-repudiation properties in data communication that motivates new demands for signcryption schemes. The framework of signcryption involv...

متن کامل

An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or

An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost significantly smaller than that required for signature-thenencryption. This paper proposes an ID-based signcryption scheme based on bilinear pairings on elliptic cu...

متن کامل

Signcryption scheme for Identity-based Cryptosystems

An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost significantly smaller than that required for signature-then-encryption. This paper proposes an ID-based signcryption scheme based on bilinear pairings on elliptic c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006