Performance Evaluation of Modified Signcryption Scheme
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 12
Abstract
Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen message encryption key. The random message encryption key would then be encrypted using the recipient's public key. We call this process two-step approach: “signature-then-encryption”. Concept signcryption, first proposed by Zheng, is a cryptography primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational cost and communication overhead are significantly lower than that needed by traditional signature then encryption. In Zheng’s scheme, the signature verification can be done recipient’s private key at receiver end and its security are based on mainly Discrete Logarithm Problem (DLP), reversing one way hash function. In proposed modified signcryption scheme, security is based on the intractability of three hard problems: Discrete Logarithm Problem, reversing one way hash function and to determine prime factors of a composit number. Proposed signcryption scheme has all the benefits of signcryption and is also able to resolve the dispute / problem of non repudiation by independent third party, without compromising with sender and recipient’s private keys.
Authors and Affiliations
Bharat Gupta , Dr. Rajeev Gupta
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
In this paper, we have compared important characteristics of MANET proactive routing protocol (DSDV), reactive protocols (AODV, DSR and TORA) and hybrid protocol (ZRP). Extensive simulations are being carried out with di...
Trust Based Load Distribution in a Data Grid Environment
The basic idea of a load balancing system is to transfer partial of system workload from busy nodes to some idle nodes. The target resource selection for task migration is a key factor in the load balance strategy. As gr...
Authenticated Routing Protocol Based on Reputation System For Adhoc Networks
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of t...
A Review of Heuristics for Optimal Page Access Sequence with a Model for Spatial Queries
Spatial Database Systems are very large databases requiring storage in disk devices. The join process between two relations that is based on spatial nature of the attributes needs repeated and redundant disk accesses. Th...
CREATION OF INTEGRATED RURAL DEVELOPMENT INFORMATION SYSTEM USING REMOTESENSING AND GIS - A MODAL STUDY ON PRAKASAM DISTRICT, A.P
The present study deals with application of Information Technology for Integrating Rural development by preparing a model for Prakasam district. This study considers the modal study area as Racherla Mandal in Markapur di...