How to Construct Efficient Signcryption Schemes on Elliptic Curves

نویسندگان

  • Yuliang Zheng
  • Hideki Imai
چکیده

Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulfills both the functions of public key encryption and digital signature, with a cost significantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over finite fields, and to examine the efficiency of such schemes. Our analysis shows that when compared with signaturethen-encryption on elliptic curves, signcryption on the curves represents a 58% saving in computational cost and a 40% saving in communication overhead.  1998 Elsevier Science B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eecient Signcryption Schemes on Elliptic Curves

Signcryption is a new paradigm in public key cryptography. A remarkable property of a signcryption scheme is that it fulllls both the functions of public key encryption and digital signature, with a cost signiicantly smaller than that required by signature-then-encryption. The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over nite elds, and to...

متن کامل

A Review of Elliptic Curve based Signcryption Schemes

Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Description of Provably Secure Signcryption Schemes

In this report we provide a detailed description of four signcryption schemes all of which have been proven secure. The first two of the schemes are based on discrete logarithm on finite fields and the other two schemes are based on elliptic curves. We also discuss issues on the implementation of signcryption schemes.

متن کامل

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices

Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. The resulting primitives are referred to as Certificateless Signcryption Tag Key Encapsulation Mechanisms (CLSC-TKEMs). In this paper we propose two novel CLSC-TKEM protocols, the first, named LSW-CLSC-TKEM, makes use ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 68  شماره 

صفحات  -

تاریخ انتشار 1998