CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Signcryption Saves Computational and Communicational Costs

Published on December 2011 by Laura Savu
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 4
December 2011
Authors: Laura Savu
f7fd816b-1164-441d-82cb-f2cef2f9c837

Laura Savu . Signcryption Saves Computational and Communicational Costs. Network Security and Cryptography. NSC, 4 (December 2011), 40-46.

@article{
author = { Laura Savu },
title = { Signcryption Saves Computational and Communicational Costs },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 4 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 40-46 },
numpages = 7,
url = { /specialissues/nsc/number4/4348-spe047t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Laura Savu
%T Signcryption Saves Computational and Communicational Costs
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 4
%P 40-46
%D 2011
%I International Journal of Computer Applications
Abstract

The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption and the practical application of signcryption in real life. Because the elliptic curve cryptography became the newest and most efficient method for public key cryptography, it is included in this paper the implementation of signcryption scheme for elliptic curves. The main contribution to this paper represents the implementation of the signcryption algorithm with the examples provided.

References
  1. Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: CRYPTO'97, LNCS 1294, pp. 165-179. Springer Verlag, 1997.
  2. Whitfield Diffie, Martin Hellman, “New Directions in Cryptography”.
  3. Y. Zheng. How to construct efficient signcryption schemes on elliptic curves.
  4. Chandana Gamage, Jussipekka Leiwo and Yuliang Zheng on, “An Eficient Scheme for Secure Message Transmission using Proxy Signcryption”.
  5. Jun-Bum Shin, Kwangsu Lee, and Kyungah Shim. New DSA-verifiable signcryption schemes. In P.J. Lee and C.H. Lim, editors, Proc. of ICISC ’02. Springer-Verlag, 2002.
  6. M.Mambo, K.Usuda and E.Okamoto. “Proxy signature: Delegation of the power to sign messages”. IEICE Trans Fundamentals,1996.
  7. D.BonehandM.Franklin, Identity-based encryption from the Weil Pairing, Crypto’01.
  8. R.L. Rivest, A. Shamir and Y. Tauman, How to leak a secret, Adv in Cryptology-Asiacrypt 2001
  9. Xinyi Huang, Willy Susilo, Yi Mu and Futai Zhang, “Identity-based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in The Ubiquitous World”
  10. Meng Wang, and Zhijing Liu, "Identity Based Threshold Proxy Signcryption Scheme".
  11. Yuliang Zheng, Alexander W. Dent, Moti Yung, “Practical Signcryption”, 2010.
  12. J. Shin, K. Lee and K. Shim, New DSA-Verifiable Signcryption Schemes, Information Security and Cryptology (ICISC 2002).
  13. John Malone-Lee, Signcryption with Non-interactive Non-repudiation, Designs, Codes and Cryptography, October 2005
  14. R. Steinfeld and Y. Zheng, A Signcryption Scheme Based on Integer Factorization, Information Security Workshop (ISW '00), 2000.
  15. Alex Dent and Yuliang Zheng: Practical Signcryption, a volume in Information Security and Cryptography, Springer-Verlag, Berlin, November 2010. (ISBN: 978-3-540-89409-4)
  16. K. Matsuura, Y. Zheng and H. Imai, Compact and Flexible Resolution of CBT Multicast Key-Distribution, Proceedings of the Second International Conference on Worldwide Computing and Its Applications (WWCA'98), Lecture Notes in Computer Science, Vol. 1368, pp. 190--205, Springer-Verlag, 1998
  17. N. Koblitz, Elliptic curve cryptosystems, in Mathematics of Computation 48, 1987, pp. 203–209
  18. V. Miller, Use of elliptic curves in cryptography, CRYPTO 85, 1985
  19. Y. Zheng, H. Imai, Effcient Signcryption Schemes on Elliptic Curves.
Index Terms

Computer Science
Information Sciences

Keywords

ElGamal elliptic curves encryption identity-based proxy-signcryption public key ring-signcryption RSA signcryption