Srusti Management Review

A Journal of Management & IT

ISSN NO: 0974-4274(PRINT), ISSN NO: 2582-1148(ONLINE)Listed in Ulrich's Periodicals Directory, INDEXED IN J-GATE E-JOURNAL GATEWAY, EBSCOHOST, PROQUEST, U.S.A. & GOOGLE SCHOLAR A Peer Reviewed and Refereed Journal

An Efficient Signcryption Scheme Based on ECC with Public Verification and Forward Secrecy

Year 2012
Volume/Issue/Review Month Vol. - V | Spl. Issue II | July
Title An Efficient Signcryption Scheme Based on ECC with Public Verification and Forward Secrecy
Authors Prof. Sumanjit Das , Er.Sangram Keshari Swain , Er.Prasant Ku. Sahoo
Broad area An Efficient Sincryption Scheme Based on ECC with Public Verification and Forward Secrecy
Abstract
Information is an asset that has a value. As an asset, information needs to be
secured from attacks. Security becomes a challenge all field of communication.
While sending a message to a person over an unreliable channel such as
internet we must provide confidentiality, integrity, authenticity and nonrepudiation
[1]. These are the four major security aspects [2] or goals.
Cryptography was concerned only with message confidentiality (i.e., encryption).
In this paper an efficient signcryption scheme based on elliptic curve
cryptosystem is proposed which can effectively combine the functionalities of
digital signature and encryption and also take a comparable amount of
computational cost and communication overhead. It provides confidentiality,
authentication, integrity, unforgeability and non repudiation, along with forward
secrecy of message confidentiality and public verification.
Description Information is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. Now-a-days security becomes an essential feature in almost all area of communication. While sending a message to a person over an ins
File
Referenceses
  • 1. Yuliang Zheng. Digital signcryption or how to achieve
  • cost (signature encryption)
  • Cost (signature), Cost (encryption). In CRYPTO ’97:
  • Proceedings of the 17th Annual International
  • Cryptology Conference on Advances in Cryptology,
  • pages 165-179, London, UK, 1997. Springer-Verlag.
  • 2. William Stallings. Cryptography and Network
  • security: Principles and Practices. Prentice Hall Inc.,
  • second edition, 1999.
  • 3. Paul C. van Oorschot Alfred J. Menezes and Scott
  • A. Vanstone. Handbook of Applied Cryptography.
  • CRC Press,1996.
  • 4. Behrouz A. Forouzan. Cryptography and Network
  • Security. Tata McGraw-Hill, 2007.
  • 5. F.Bao, R.H. Deng, “A signcryption scheme with
  • signature directly verifiable by public key”,
  • Proceedings of PKC’98, LNCS 1431, Springer-Verlag,
  • 1998, pp. 55–59.
  • 6. LEI Feiyu, CHEN Wen, CHEN Kefei, “A generic
  • solution to realize public verifiability of signcryption”,
  • Wuhan University Journal of Natural Sciences, Vol.
  • 11, No. 6, 2006, 1589-1592.
  • 7. Mohsen Toorani and Ali Asghar Beheshti Shirazi.
  • Cryptanalysis of an efficient signcryption scheme with
  • forward secrecy based on elliptic curve. Computer
  • and Electrical Engineering, International Conference
  • on, 428-432, 2008.
  • 8. Yuliang Zheng and Hideki Imai. How to construct
  • efficient signcryption schemes on elliptic curves. Inf.
  • Process. Lett., 68(5):227-233, 1998.
  • 9. Jung.H.Y,K.S Chang, D.H Lee and J.I. Lim,
  • Signcryption scheme with forward secrecy.
  • Proceeding of Information Security Application-WISA,
  • Korea, 403-475, 2001.
  • 10. Gamage, C., J.Leiwo, Encrypted message
  • authentication by firewalls. Proceedings of
  • International Workshop on Practice of Theory in
  • Public Key Cryptography, Berlin, 69-81, 1999.
  • 11. X. Yang Y. Han and Y. Hu. Signcryption based on
  • elliptic curve and its multi-party schemes.
  • Proceedings of the 3rd ACM International Conference
  • on Information Security (InfoSecu 04), pages 216-
  • 217, 2004.
  • 12. Henri Cohen and Gerhard Frey, editors. Handbook
  • of elliptic and hyperelliptic curve cryptography. CRC
  • Press, 2005.
  • 13. Mohsen Toorani and Ali Asghar Beheshti Shirazi.
  • An elliptic curve-based signcryption scheme with
  • forward secrecy. Journal of Applied Sciences,
  • 9(6):1025 -1035, 2009.
  • 14. G. Seroussi. Elliptic curve cryptography. page 41,
  • 1999.
  • 15. Hwang Lai Su. An efficient signcryption scheme with
  • forward secrecy based on elliptic curve. Journal of
  • applied mathematics and computation, pages 870-
  • 881, 2005.
  • 16. Mohsen Toorani and Ali Asghar Beheshti Shirazi.
  • Cryptanalysis of an elliptic curve-based signcryption
  • scheme. International journal of network security
  • vol.10, pp 51-56,2010.
  • 17. Wang Yang and Zhang. Provable secure generalized
  • signcryption. Journal of computers, vol.5, pp 807-
  • 814, 2010.