Eecient Signcryption Schemes on Elliptic Curves
نویسنده
چکیده
Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulllls both the functions of public key encryption and digital signature, with a cost signiicantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over nite elds, and to examine the eeciency of such schemes. Our analysis shows that when compared with signature-then-encryption on elliptic curves, signcryption on the curves represents a 58% saving in computational cost and a 40% saving in communication overhead.
منابع مشابه
How to Construct Efficient Signcryption Schemes on Elliptic Curves
Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulfills both the functions of public key encryption and digital signature, with a cost significantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over finite fields, ...
متن کاملA Review of Elliptic Curve based Signcryption Schemes
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...
متن کاملDescription of Provably Secure Signcryption Schemes
In this report we provide a detailed description of four signcryption schemes all of which have been proven secure. The first two of the schemes are based on discrete logarithm on finite fields and the other two schemes are based on elliptic curves. We also discuss issues on the implementation of signcryption schemes.
متن کاملShortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes
1 Summary This submission consists of three separate parts. Although these parts are technically related, each addresses a diierent issue in cryptography and can serve as an independent contribution to the standard. Schemes described in this submission can play a role complementary to those designed in a diierent approach. A common feature of these schemes is that they all attemp to minimize co...
متن کاملA New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights
In this paper, a new identity-based proxy signcryption scheme is presented. The proposed scheme allows partial delegation of signing rights. Consequently, a signature created by the proxy signer is distinguishable from that created by the principal signer. This level of security is a common requirement in many applications to prevent malicious proxy agents from impersonating the principal signe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996