Cryptanalysis of Signcryption Protocols Based On Elliptic Curve

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 1

Abstract

 ABSTRACT: The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data by encrypting it. It was first introduced by Zheng in 1997 based on DLP. The signcryption combines the techniques of digital signature and encryption which reduces computational cost and communication overhead. The Signcryption scheme verifies the integrity of message before decryption of cipher text it also provides how the message can be verify by third party without reading the content of message. Many researchers have given their signcryption scheme to achieve security goals like confidentiality, unforgeability, integrity, forward secrecy and public verification every scheme is having their own limitations. This paper represents the cryptanalysis of popular signcryption scheme in terms of major security goals alpng with the communication overhead and computational cost.

Authors and Affiliations

Sumanjit Das

Keywords

Related Articles

 Experimental Studies of Automotive Disc Brake Noise and Vibration: A Review

 ABSTRACT: In the last few decades, there have been extensive studies on analysis and investigation of disc brake vibrations done by many researchers around the world on the possibility of eliminating brake vibratio...

 A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs

 A mobile ad hoc wireless network (MANET) consists of a number of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration...

 A Security Framework for Replication Attacks in Wireless Sensor Networks

 Mobile sinks play a great role in many Wireless Sensor Network applications for efficient data accumulation, localized sensor reprogramming and for collecting data from various sensor nodes across the globe. Howeve...

 An Efficient Illumination Normalization Method with Fuzzy LDA Feature Extractor for Face Recognition

 Nearest Neighbour classifier , Support Vector Machines (SVM) and Feedforward Neural  Network(FFNN).The experiments were performed on the ORL (Olivetti Research Laboratory) and Yale face image databases and the...

 Need For Strengthening Automobile Industry in Ethiopia

 Abstract: The main purpose of this paper is to analyze automotive industry and its trend in strengthening the industry in Ethiopia. In recent years, the condition of the automotive sector is increasing and it is pl...

Download PDF file
  • EP ID EP109275
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

Sumanjit Das (2013).  Cryptanalysis of Signcryption Protocols Based On Elliptic Curve. International Journal of Modern Engineering Research (IJMER), 3(1), 89-92. https://europub.co.uk/articles/-A-109275