CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Public Verifiability Signcryption Scheme without Pairings

by Hassan M. Elkamchouchi, Mohamed H. El-Atiky, Eman Abouelkheir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 157 - Number 9
Year of Publication: 2017
Authors: Hassan M. Elkamchouchi, Mohamed H. El-Atiky, Eman Abouelkheir
10.5120/ijca2017912815

Hassan M. Elkamchouchi, Mohamed H. El-Atiky, Eman Abouelkheir . A Public Verifiability Signcryption Scheme without Pairings. International Journal of Computer Applications. 157, 9 ( Jan 2017), 35-40. DOI=10.5120/ijca2017912815

@article{ 10.5120/ijca2017912815,
author = { Hassan M. Elkamchouchi, Mohamed H. El-Atiky, Eman Abouelkheir },
title = { A Public Verifiability Signcryption Scheme without Pairings },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2017 },
volume = { 157 },
number = { 9 },
month = { Jan },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume157/number9/26862-2017912815/ },
doi = { 10.5120/ijca2017912815 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:03:30.504335+05:30
%A Hassan M. Elkamchouchi
%A Mohamed H. El-Atiky
%A Eman Abouelkheir
%T A Public Verifiability Signcryption Scheme without Pairings
%J International Journal of Computer Applications
%@ 0975-8887
%V 157
%N 9
%P 35-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces a new scheme “ A Public Verifiability Signcryption Scheme Without Pairings ” , based on elliptic curve discrete logarithm problem (ECDLP) and in addition to achieve the functionality of the Signcryption schemes, unforgeability, confidentiality and nonrepudiation, it achieves forward security and public verifiability directly. Also, it uses a strong encryption key depends on random choose value and the sender’s private key, although the proposed scheme is slower than the Zheng’s signcryption scheme, it achieves saving in communication overhead reach to 50% with respect to the traditional approach signature then encryption. The proposed scheme has been verified using the Mathematica program.

References
  1. Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost(encryption)”, Advances in Cryptology – Crypto’97, LNCS 1294, Springer-Verlag, 1997, pp. 165–179.
  2. Y. Zheng, “Signcryption and Its Applications in Efficient Public Key Solutions”, Monash University Australia, Lecture Notes in Computer Science, Vol.1397, pp.291-312, Springer-Verlag, 1998 URL: http://www-pscit.fcit.monash.edu.au/~yuliang/.
  3. Y. Zheng, and H. Imai, “How to construct efficient signcryption schemes on elliptic curves,” Information Processing Letters, Vol.68, pp.227-233, Elsevier, 1998.
  4. Feng Bao and Robert H Deng, “A Signcryption Scheme with Signature Directly Veriable by Public Key”, Institute of Systems Science National University of Singapore Kent Ridge Singapore.
  5. C. Gamage, J. Leiwo, and Y. Zheng, “Encrypted message authentication by firewalls,” International Workshop on Practice and Theory in Public Key Cryptography (PKC-99), LNCS 1560, pp.69-81, Springer-Verlag, March 1999.
  6. Y. Han, X. Yang, and Y. Hu, “Signcryption Based on Elliptic Curve and Its Multi-Party Schemes”, 3rd ACM International Conference on Information Security (InfoSecu'04), pp.216-217, 2004.
  7. Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su,” An efficient signcryption scheme with forward secrecy based on elliptic curve” , Department of Computer Science and Information Engineering, Tamkang University, Math. Comput. 167 (2005) pp. 870–881, Elsevier ,2004.
  8. H. Lin , T. Wu and S. Huang " An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce" Journal Of Information Science And Engineering 28, 771-785 (2012)
  9. H. Delfs and H. Knebl, Introduction to Cryptography: Principles and Applications ,Springer, Berlin, 2002.
  10. http://www.certicom.com/index.php/index.php/52-the-elliptic-curve-discrete-logarithm-problem.
  11. C. Popescu,” A Secure Authenticated Key Agreement Protocol”, University of Oradea, Department of Mathematics, Oradea, Romania.
  12. Darrel Hankerson, Alfred Menezes, Scott Vanstone, “Guide to Elliptic Curve Cryptography”, 2004 Springer-Verlag New York.
  13. Avi Kak, “Elliptic Curve Cryptography and Digital Rights Management ”, Avinash ak, Purdue University, April 20, 2011.
  14. William Stallings, “Cryptography and Network Security Principles and Practices, Fourth Edition”, Prentice Hall, November 16, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Signcryption Public Verifiability Forward security Communication Overhead Saving.