243 Hits in 3.7 sec

A Signcryption Scheme Based on Integer Factorization [chapter]

Ron Steinfeld, Yuliang Zheng
2000 Lecture Notes in Computer Science  
We propose a new signcryption scheme which gives a partial solution to an open problem posed by Zheng, namely to find a signcryption scheme based on the integer factorization problem.  ...  Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower computational and communication  ...  Consistent with this approach, Zheng posed, in his original paper [17] , the open problem of finding a signcryption scheme based on the integer factorization problem, which appears to be computationally  ... 
doi:10.1007/3-540-44456-4_23 fatcat:vfth43axlvbdxkgrhe2dnqrdfa

A new efficient strong proxy signcryption scheme based on a combination of hard problems

Hassan Elkamchouchi, Mohammed Nasr, Roayat Ismail
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
In this paper we propose a new proxy signcryption scheme which has the following advantages as compared to the previous schemes: (1) It is based on a combination of hard problems: Integer Factorization  ...  Proxy signcryption scheme is the combination of proxy signature and encryption.  ...  But it is desirable to design a proxy signcryption scheme based on other problem, such as Integer Factorization Problem (IFP).  ... 
doi:10.1109/icsmc.2009.5346018 dblp:conf/smc/ElkamchouchiNE09 fatcat:ugtdmrhe5nfw3n5oknk7wac2re

Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite [chapter]

Yuliang Zheng
2001 Lecture Notes in Computer Science  
This contributes to the research of extending computational underpinnings of signcryption schemes to problems related to integer factorization.  ...  The concept of signcryption, together with an implementation based on the discrete logarithm problem, was proposed in 1996.  ...  Acknowledgment Thanks to Ron Steinfeld for various discussions on selecting security parameters for the schemes. Thanks also to PKC2001 Program Committee members for their helpful comments.  ... 
doi:10.1007/3-540-44586-2_4 fatcat:mkbyymjd4nfzpf4wdu3xw5zl4q

Combining Public Key Encryption with Schnorr Digital Signature

Laura Savu
2012 Journal of Software Engineering and Applications  
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.  ...  The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  Conclusions and Future Work This paper presents a new Signcryption scheme which is based on Schnorr digital signature algorithm.  ... 
doi:10.4236/jsea.2012.52016 fatcat:lnmjdpret5e63atgffv6snkc7q

An Efficient Identity-based Signcryption from Lattice

Xiufeng Zhao, Xiang Wang
2014 International Journal of Security and Its Applications  
In this paper, an efficient identity-based signcryption scheme from lattice was proposed. Our scheme based on Macciancio and Piekert's trapdoor generation method and delegate algorithm for lattice.  ...  Signcryption is a cryptographic primitive that can provide valid solution for authentication and confidentiality.  ...  on lattices to within small factors.  ... 
doi:10.14257/ijsia.2014.8.2.37 fatcat:6y7du2ge5bcqjnw5z2jzynrtoe

Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation

Ramratan Ahirwal, Anjali Jain, Y. K. Jain
2013 International Journal of Computer Applications  
In this paper a Signcryption scheme is suggested which is based on Elliptic Curve Cryptography (ECC).  ...  Signcryption scheme based on elliptic curves represents a remarkable saving in computational cost and in communication overhead.  ...  Figure 9 compares, the time that is required to solve problem based on ECC and problem based on Integer factorization problem (IFP) or DLP. Here the time is measured in MIPS.  ... 
doi:10.5120/10112-4777 fatcat:pxaiwbzfajak3hqc54m4n6gq6m

A Strong Designated Verifiable DL Based Signcryption Scheme

Sujata Mohanty, Banshidhar Majhi
2012 Journal of Information Processing Systems  
This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it  ...  The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP).  ...  CONCLUSION In this paper, we present a new designated verifiable signcrytion scheme based on DLP. Here the property strongly designated verifiability is satisfied.  ... 
doi:10.3745/jips.2012.8.4.567 fatcat:jas2ikagfjaptdeby2wfmebcre

Public Verifiable Identity based Multi-Proxy Multi-Signcryption Scheme from Bilinear Pairings

Tej Singh, Rashid Ali
2016 International Journal of Computer Applications  
This paper presents public verifiable identity based multiproxy multi-signcryption scheme from pairings.  ...  In this scheme a proxy signcrypter group could authorized as a proxy agent by the cooperation of all members in the original signcrypter group.  ...  CONCLUSION In this paper, based on Liu Jun Bao and Xiao Guo-Zhen [15] we construct a public verifiable ID-based multi-proxy multisigncryption scheme from pairing.  ... 
doi:10.5120/ijca2016908887 fatcat:k6l7pmqumzhalloe6nriu4oije

Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption) [chapter]

Yuliang Zheng
1997 Lecture Notes in Computer Science  
) less in message expansion than does "signature followed by encryption" based on the discrete logarithm problem (factorization problem, respectively).  ...  In particular, we discover a new cryptographie primitive termed as "signcryption" which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step  ...  Therefore it remains a challenging open problem to design signcryption schemes based factorization or other computationally hard problems.  ... 
doi:10.1007/bfb0052234 fatcat:n5ewdyb2gbeppc4u5ukwjlnlxy

Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography

Lize Gu, Shihui Zheng
2014 Journal of Applied Mathematics  
In this paper, we propose several conjugated problems related to the factorization problem over nonabelian groups and then present three constructions of cryptographic primitives based on these newly introduced  ...  Recently, Baba et al. proposed an important analogy from the integer factorization problem to the factorization problem over nonabelian groups.  ...  Signcryption with IND-CCA2 Security. Based on the encryption scheme 1 and the signature scheme 2 , let us proceed to present a signcryption scheme, denoted by 3 .  ... 
doi:10.1155/2014/630607 fatcat:7jqkwt5exnabdnwjumrwidzaue

Enhancing Email Security by Signcryption based on Elliptic Curve

A. K.Mohapatra, Jyoti Kushwaha, Tanya Popli
2013 International Journal of Computer Applications  
In this paper, an elliptic curve based signcryption scheme is introduced that provides several security attributes such as confidentiality, authentication, integrity, non-repudiation, and forward secrecy  ...  The currently used protocols such as PGP and S/MIME are based on public key cryptography that involves huge computational costs due to key generation, key exchange and encryption.  ...  Proposed approach is as: EC based signcryption scheme is used since it is based on the difficulty of solving the ECDLP and the factorization in elliptic curves.  ... 
doi:10.5120/12451-9215 fatcat:yc23qa7b3faxpmzabb5z2mpz7i

Performance Comparison of Signcryption Schemes – A Step towards Designing Lightweight Cryptographic Mechanism

Anuj Kumar Singh, Patro B.D.K
2017 International Journal of Engineering and Technology  
The strength of these schemes depend upon the difficulty of solving any one problem namely IFP (Integer Factorization Problem), (DLP) Discrete Logarithmic Problem, ECDLP (Elliptic Curve Discrete Logarithmic  ...  Signcryption is a new way to achieve confidentiality and authentication simultaneously.  ...  Selection of Public Parameters 1. p and q -two large prime numbers, where q is a largeprime factor of 1 p − g -a random integer inthe range 1, 1 p −     with order q modulo p . 3 .  ... 
doi:10.21817/ijet/2017/v9i2/170902173 fatcat:jgcpm77nenfw3jkzb3hwtd4pbu

Noncommutative Lightweight Signcryption for Wireless Sensor Networks

Lize Gu, Yun Pan, Mianxiong Dong, Kaoru Ota
2013 International Journal of Distributed Sensor Networks  
In this paper, we at first propose a braid-based signcryption scheme and then develop a key establishment protocol for wireless sensor networks.  ...  From the complexity view, our proposal is 2 15 times faster than RSA-based ones. As far as we know, our proposal is the first signcryption scheme based on noncommutative algebraic structures.  ...  Now, let us compare the braid-based signcryption schemes with the RSA-based ones. According to Cha et al.  ... 
doi:10.1155/2013/818917 fatcat:gzlglbgue5eahkk7336gtxljrm

How to construct efficient signcryption schemes on elliptic curves

Yuliang Zheng, Hideki Imai
1998 Information Processing Letters  
The purposes of this paper are to demonstrate how to specify signcryption schemes on elliptic curves over finite fields, and to examine the efficiency of such schemes.  ...  Our analysis shows that when compared with signaturethen-encryption on elliptic curves, signcryption on the curves represents a 58% saving in computational cost and a 40% saving in communication overhead  ...  Parameters for elliptic curve based signcryption schemes are summarized in Table 2 , and two signcryption schemes built on SECDSS1 and SECDSS2 are described in Table 3 .  ... 
doi:10.1016/s0020-0190(98)00167-7 fatcat:ogrwqo6pnvbw7lfkcnsfor52b4

An efficient Secure Electronic Mail System based on Elliptic Curve Certificateless Signcryption

Roayat Ismail, Lamiaa Abdelsalam, Mahmoud Ahmed
2019 International Journal of Computer Applications  
In this paper, a CLC-EC-signcryption based secure E-mail system is proposed. To make the system more efficient, the encryption key is hidden in the transmitted ciphertext itself.  ...  Therefore, the email security and efficiency has become a critical issue.  ...  Signcryption When Alice has a message M to send in an E-mail to Bob, she does the following: 1. Choose a random integer x < p. 2.  ... 
doi:10.5120/ijca2019919619 fatcat:3cz3atsfpjdzna5su7ahi3mbam
« Previous Showing results 1 — 15 out of 243 results