A Study on signcryption Scheme Based on Eliptic Curve
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure communication network is a crucial issue for the reason that it may get tempered by third party [1]. Everyone desires their messages must be travel in the network in a secure fashion. The message does not tempered by any unauthorized one. So our focal is how we can add more security to the messages than the existing so that it can fulfill the user requirements without any damage. There are various cryptographic techniques be present which offers security to the messages [2]. Traditional Signature then encryption technique is responsible for security to the messages by performing signature scheme and encryption scheme in two unlike logical steps. As it achieves signature and encryption scheme in two unlike logical steps it takes more computational cost and communication overhead. The novel technique titled as “signcryption” by Yuling Zheng, accomplishes both the functionality of signature scheme and encryption scheme in single logical step with a reduced amount of computational and communication cost than Signature- then-encryption scheme [1]. A number of signcryption schemes are previously announced by many researchers Nonetheless each scheme has their own restriction [2]. This paper contain cryptanalysis of different signcryption schemes based on the security goals like integrity, authentication, confidentiality, unforgeability beside that forward secrecy and public verification., where one can confirm the sender signature without reading the content of messages since the messages is in encrypted format and the cannot be able to mine the original message content even if the long-term private key of the sender is compromised [4].
Authors and Affiliations
Anjali Pandey , Sumanjit Das
Secure Routing Backup Protocol for MANET from Selective Forwarding Attack
In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns mobi...
Analysis of Simulation Tools for Underwater Wireless Sensor Networks
Our earth is enclosed by 75% of water that could be a river or sea or ocean. The underwater sensor network becomes more and more conventional for monitoring huge areas of the oceans where manual intervention is not possi...
SURVEY ON SIMULATION AND EMULATION TOOLS IN WIRELESS SENSOR NETWORK
Sensor networks are dense wireless networks of small, low-cost sensors which collect and propagate environmental data. Wireless sensor networks (WSNs) assist monitoring and controlling of physical environments from remot...
DETERMINATION OF BLOOD CAPILIARY OBSTRUCTION THROUGH LASER SPECKLE IMAGING VIA SIMULATING THE OBSTRUCTION CONDITION
Laser Speckle contrast imaging was first introduced in 1980s, since then it has emerged as a powerful tool for full-field imaging technique for blood flow measurement. In recent years laser speckle contrast imaging techn...
An Approach of Zero Correlation Linear Cryptanalysis
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...