Performance Evaluation of Modified Signcryption Scheme
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 12
Abstract
Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen message encryption key. The random message encryption key would then be encrypted using the recipient's public key. We call this process two-step approach: “signature-then-encryption”. Concept signcryption, first proposed by Zheng, is a cryptography primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational cost and communication overhead are significantly lower than that needed by traditional signature then encryption. In Zheng’s scheme, the signature verification can be done recipient’s private key at receiver end and its security are based on mainly Discrete Logarithm Problem (DLP), reversing one way hash function. In proposed modified signcryption scheme, security is based on the intractability of three hard problems: Discrete Logarithm Problem, reversing one way hash function and to determine prime factors of a composit number. Proposed signcryption scheme has all the benefits of signcryption and is also able to resolve the dispute / problem of non repudiation by independent third party, without compromising with sender and recipient’s private keys.
Authors and Affiliations
Bharat Gupta , Dr. Rajeev Gupta
An Agent Based Simulation Model for Warning Messages Dissemination in a Vehicular Ad hoc Network
Since the safety on roads has become a main concern for both governments and car manufacturers in the last twenty years, number of applications into the domain of vehicular communication is proposed. Vehicular Ad hoc Net...
AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS
In this paper, an effective procedure to determine the reduced order model of higher order linear time invariant dynamic multivariable systems is discussed. Numerator and denominator polynomials of reduced order model ar...
Web Based ‘C’ IDE: Approach
A Web based environment has been designed to execute C programs without explicitly installing any compilers on the machine, thus addressing the concerns of portability and accessibility. The environment runs on a Linux s...
Improved Digital Watermarking Techniques and Data Embedding In Multimedia
Digital watermarking is a technology being developed to ensure security and protection of multimedia data. The purpose of digital watermarking is not to restrict use of multimedia resources, but rather to facilitate data...
Clustered Chain based Power Aware Routing (CCPAR) Scheme for Wireless Sensor Networks
Wireless sensor networks with thousands of tiny sensor nodes are becoming immensely popular due to their wide applicability in multitude of applications such as monitoring and collecting data from unattended hazardous en...