An efficient elliptic curve based signcryption scheme for firewalls

Author(s):  
Waseem Iqbal ◽  
Mehreen Afzal ◽  
Farhan Ahmad
2011 ◽  
Vol 1 ◽  
pp. 198-203
Author(s):  
Xiu Ying Yu ◽  
Da Ke He

Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based multi-signcryption scheme cannot offer the function of public verifiability, based on identity and bilinear pairing on the Elliptic Curve, a new scheme with public verifiability is proposed. In the scheme, with the steps which is comparatively independent to the signcryption process, it can provide the public verification of each signcryption in need. Therefore, our scheme efficiently achieves the cryptographic functions of multi-signcryption.


Author(s):  
Simone Patonico ◽  
Placide Shabisha ◽  
An Braeken ◽  
Abdellah Touhafi ◽  
Kris Steenhaut

2020 ◽  
Vol 39 (6) ◽  
pp. 8237-8247
Author(s):  
Malathi Devarajan ◽  
N. Sasikaladevi

With the growing trend of Communication Technologies (ICT), buying goods through online has been increased drastically. Besides, e-payment makes online purchase easier and made our daily life more convenient. However, there exists a user privacy and data security issue in conventional e-payment systems. Thus, a hyper elliptic curve based signcryption scheme is proposed to achieve reduced computational cost. Because, most of the payment is processed on resource constraint devices like smart phone, hence an energy efficient e-payment system is in requisite. In order to ensure user authenticity, an aadhaar number (unique identity) is used to generate signcryption key. The proposed signcryption scheme can be implemented in real-time applications like e-payment system to ensure confidentiality, privacy, authenticity and integrity. The security of the system is validated through a simulation tool – AVISPA (Automated Validation of Internet Security Protocols and Applications). Further, the resistivity against various cryptographic attacks was analyzed informally and also the computational cost is estimated and compared with other related schemes.


2005 ◽  
Vol 167 (2) ◽  
pp. 870-881 ◽  
Author(s):  
Ren-Junn Hwang ◽  
Chih-Hua Lai ◽  
Feng-Fu Su

Sign in / Sign up

Export Citation Format

Share Document