Cryptanalysis of Signcryption Protocols Based On Elliptic Curve

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 1

Abstract

 ABSTRACT: The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data by encrypting it. It was first introduced by Zheng in 1997 based on DLP. The signcryption combines the techniques of digital signature and encryption which reduces computational cost and communication overhead. The Signcryption scheme verifies the integrity of message before decryption of cipher text it also provides how the message can be verify by third party without reading the content of message. Many researchers have given their signcryption scheme to achieve security goals like confidentiality, unforgeability, integrity, forward secrecy and public verification every scheme is having their own limitations. This paper represents the cryptanalysis of popular signcryption scheme in terms of major security goals alpng with the communication overhead and computational cost.

Authors and Affiliations

Sumanjit Das

Keywords

Related Articles

Variable Threshold MOS Circuits

Dynamic threshold MOS (DTMOS) circuits provide low leakage and high current drive , compared to CMOS circuits, operated at low voltages. This paper proposes a modified DTMOS approach, called Variable threshold MOS (VTMOS...

 Effect of Co-pesticide on Adsorption- Desorption Process on Agricultural Soils

 This work aim is to study the effect of different co-pesticides as Atrazine and propanil on adsorption processes on agricultural soil samples. The co-pesticides as Atrazine on adsorption behavior of metolachlor [2...

Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm

Gesture recognition pertains to recognizing meaningful expressions of motion by a human, involving the hands, arms, face, head, and/or body. It is of utmost importance in designing an intelligent and efficient human–comp...

 Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relieving Feature

 A gear is a component within a transmission device that transmits rotational forces. Gears are commonly used for transmitting power. Gear teeth failure due to fatigue is a common fact observed. Even a small red...

 Design Methodology of Current Buffer based Two Stage CMOS Op-Amp with Compensation Strategy

 High Bandwidth Operational Amplifiers are needed for many applications. The Design methodology with current buffer overcomes the drawbacks in design strategies of nulling resistor and voltage buffer. The appro...

Download PDF file
  • EP ID EP109275
  • DOI -
  • Views 132
  • Downloads 0

How To Cite

Sumanjit Das (2013).  Cryptanalysis of Signcryption Protocols Based On Elliptic Curve. International Journal of Modern Engineering Research (IJMER), 3(1), 89-92. https://europub.co.uk/articles/-A-109275