Filters








457 Hits in 3.1 sec

Signcryption Scheme Based on SCHNORR Digital Signature

Laura Savu
2012 International Journal of Peer to Peer Networks  
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.  ...  The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  ACKNOWLEDGEMENTS This paper presents a new Signcryption scheme which is based on Schnorr digital signature algorithm.  ... 
doi:10.5121/ijp2p.2012.3101 fatcat:mfloitn4krbxbekofasg3b5qx4

Signcryption scheme based on schnorr digital signature [article]

Laura Savu
2012 arXiv   pre-print
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area.  ...  The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.  ...  ACKNOWLEDGEMENTS This paper presents a new Signcryption scheme which is based on Schnorr digital signature algorithm.  ... 
arXiv:1202.1663v1 fatcat:cfngrkm4dzdlvhsefek4k6kmam

A Secure Agent-Mediated Payment Protocol [chapter]

Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren
2002 Lecture Notes in Computer Science  
This is realized by introducing a Trusted Third Party (TTP) in the payment system based on the SET protocol (Secure Electronic Transaction) and a novel signcryption-threshold scheme.  ...  At the same time, with the signcryptionthreshold scheme, the PA is more flexible and autonomous during trading.  ...  As for the proposed signcryption scheme that is based on Shamir-threshold scheme, each sharing party won't know secret shares except its own share.  ... 
doi:10.1007/3-540-36159-6_36 fatcat:jxswq4w6ozdatl7h6v3oyxcgti

An Upgraded SignCryption Scheme Using FORWARD SECRECY
English

2015 International Journal of Research and Applications  
In this paper, we intend a new technique to the superior scheme is an ameded version of existing mechanism followed in Bao & Deng, in which publicly verifiable signcryption is to be deliberated [3].  ...  The proposed signcryption schemes are compact and particularly suitable for smart card based applications. We envisage that they will end  ...  based on different security services.IV.  ... 
doi:10.17812/ijra.2.7(56)2015 fatcat:yrw5b573onbz5bjmyfmvawxvj4

Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme

S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
Recently in May 2008, a scheme for identity based threshold signcryption was proposed by Fagen Li and Yong Yu.  ...  Further, we propose a corrected version of the scheme and formally prove its security under the existing security model for signcryption.  ...  We have shown a possible attack on their scheme where the clerk can obtain the secret key of the sender. Hence a total break of the system is possible.  ... 
doi:10.1109/euc.2008.187 dblp:conf/euc/SelviVRJ08 fatcat:3sspyiqrkfcjhercjqesvozmnm

Protection of mobile agent and its itinerary from malicious host

Shashank Srivastava, G. C Nandi
2011 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011)  
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce, how to protect the transaction security is the key technology of based Agent Electronic Commerce System.  ...  To overcome the mobile agent attack a multi signcryption protocol scheme is being adapted to protect data integrity, data confidentiality and user authentications.  ...  In this paper, the Tatara and Sakurai [2] introduced universal re protocol offers confidentiality and integrity to the signcryption scheme based on the discrete logarithm. messages carried by a mobile  ... 
doi:10.1109/iccct.2011.6075189 fatcat:gtgmm6krrreynibh55ndtyexmi

Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications

Subhan Ullah, Lucio Marcenaro, Bernhard Rinner
2019 Sensors  
This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step.  ...  Our certificateless multi-receiver aggregate-signcryption protection has been implemented for a smart camera IoT scenario, and the runtime and communication effort has been compared with single-sender/  ...  Our approach is based on EC-based signcryption which performs data signing and encryption in a single step [7] .  ... 
doi:10.3390/s19020327 fatcat:5smgiviwonhq5c6trr4oeqobay

Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications [chapter]

Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello
2018 Lecture Notes in Computer Science  
In this paper, we propose a Cooperative Data Aggregation solution based on a novel use of Attribute Based signcryption scheme (Coop-DAAB).  ...  Thanks to the use of an attribute based signcryption scheme, authenticity of data collected by IoT devices is proved while protecting them from any unauthorized access.  ...  This scheme is based on the use of a set homomorphic signature scheme to aggregate received signed data from IoT devices without learning secret keys of each participant.  ... 
doi:10.1007/978-3-030-02610-3_28 fatcat:jzjv3kela5h7jkxrwzvq42ulce

An Efficient Proxy Blind Signcryption Scheme for IoT

Aamer Khan, Insaf Ullah, Fahad Algarni, Muhammad Naeem, M. Irfan Uddin, Muhammad Asghar Khan
2022 Computers Materials & Continua  
We designed a light weight and secure proxy blind signcryption for multi-digital messages based on a hyperelliptic curve (HEC).  ...  Our results outperform the available schemes in terms of computational cost and communication bandwidth.  ...  [39] introduced a proxy-signcryption based on the notion of warrants.  ... 
doi:10.32604/cmc.2022.017318 fatcat:cxk7bvbvlvdwrjrfpwtiswfqlm

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

2017 KSII Transactions on Internet and Information Systems  
Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography  ...  After that Wang and Wang [23] contribute a proxy blind signature scheme based on ECDLP.  ...  Of these two signcryption techniques, the former presents a different type of a threshold signcryption protocol by assigning a group of signatures to share a secret link for multiple documents and their  ... 
doi:10.3837/tiis.2017.11.020 fatcat:zawcfyej4vek5kh3elpqdjpk3a

A survey on new approaches in SignCryption
English

2015 International Journal of Research and Applications  
The proposed signcryption schemes are compact and particularly suitable for smart card based applications.  ...  The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of digital signature and encryption in a single logical step.  ...  SignCryption scheme based on elliptic curve cryptosystem, which provides forward secrecy.  ... 
doi:10.17812/ijra.2.6(48)2015 fatcat:i2vsibjpo5hbxnpg4gjorwynlq

A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant

Roayat Ismail
2017 International Journal of Computer Applications  
In this paper, a new proxy signcryption scheme is proposed based on Discrete Logarithm Problem (DLP) and Diffie-Hellman Problem (DHP) with a reduced computational cost compared to other schemes in literature  ...  Proxy signcryption scheme allows an original signer to delegate his signing power to a proxy such that the latter can signcrypt a message on behalf of the former.  ...  ; section 5 introduces a variant of the proposed proxy signcryption scheme based on the ECDLP and ECDHP.  ... 
doi:10.5120/ijca2017913804 fatcat:ea23st4d3bhgnjup4nyshmaoca

Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities

Shafi Ullah, Raja Zahilah, Ilyas Khan, A. Alshehri, T.M. Yazdani
2022 IEEE Access  
This paper offers in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication  ...  The requirements to secure the sensitive data shared between these devices consist of a resilient encryption technique with affordable operational costs.  ...  The scheme is supervised by an administrator who transfers all rights of signcryption to a proxy-agents where the agent generated signcryption based encrypted data on the behalf of the administrator.  ... 
doi:10.1109/access.2022.3160000 fatcat:fub6ilfhhrhndfwtsrfugwp5nm

Lightweight Certificate less Signcryption Scheme based on Elliptic Curve

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This essential requirement has motivated the authors to present an efficient Signcryption scheme based on elliptic curve cryptography.  ...  As of late, many new signcryption techniques are executed on elliptic cryptosystem (ECC) to lessen the calculation loads for devices with low computation requirements.  ...  Definition (Signcryption Scheme): Notations: GenS: A sender key generation calculation GenR: A receiver key generation calculation SIGNCRYPTION: Given a message m, a Sender's secret key SKs and Receiver's  ... 
doi:10.35940/ijitee.i8419.0881019 fatcat:g2p7njgrhffp5ffm7jovit4gxm

A new efficient strong proxy signcryption scheme based on a combination of hard problems

Hassan Elkamchouchi, Mohammed Nasr, Roayat Ismail
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
In this paper we propose a new proxy signcryption scheme which has the following advantages as compared to the previous schemes: (1) It is based on a combination of hard problems: Integer Factorization  ...  Proxy signcryption scheme is the combination of proxy signature and encryption.  ...  But it is desirable to design a proxy signcryption scheme based on other problem, such as Integer Factorization Problem (IFP).  ... 
doi:10.1109/icsmc.2009.5346018 dblp:conf/smc/ElkamchouchiNE09 fatcat:ugtdmrhe5nfw3n5oknk7wac2re
« Previous Showing results 1 — 15 out of 457 results