How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Digital Signcryption or How to Achieve Cost(Signature & Encryption)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Signcryption Scheme with Signature Directly Verifiable by Public Key
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Signcryption Scheme with Standardized Verification Algorithm
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
ICCEE '08 Proceedings of the 2008 International Conference on Computer and Electrical Engineering
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Hi-index | 0.00 |
In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logical step called Signcryption. In this paper a Signcryption scheme is suggested which is based on Elliptic Curve Cryptography (ECC) with an authentication technique of generating true random number from image for the authenticity of the valid message. The scheme provides additional security and authentication features which include the property of forward secrecy, public verifiability authenticity and counter steps. The proposed scheme provides better performance aspect for the security feature provided; compared to the traditional Signature-then-Encryption schemes based on ECC.