Performance Evaluation of Modified Signcryption Scheme
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 12
Abstract
Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen message encryption key. The random message encryption key would then be encrypted using the recipient's public key. We call this process two-step approach: “signature-then-encryption”. Concept signcryption, first proposed by Zheng, is a cryptography primitive which combines both the functions of digital signature and public key encryption in a logical single step, and with a computational cost and communication overhead are significantly lower than that needed by traditional signature then encryption. In Zheng’s scheme, the signature verification can be done recipient’s private key at receiver end and its security are based on mainly Discrete Logarithm Problem (DLP), reversing one way hash function. In proposed modified signcryption scheme, security is based on the intractability of three hard problems: Discrete Logarithm Problem, reversing one way hash function and to determine prime factors of a composit number. Proposed signcryption scheme has all the benefits of signcryption and is also able to resolve the dispute / problem of non repudiation by independent third party, without compromising with sender and recipient’s private keys.
Authors and Affiliations
Bharat Gupta , Dr. Rajeev Gupta
Drag and Drop: Influences on the Design of Reusable Software Components
The fundamental unit of large scale software construction is he component. A component is the fundamental user interface object in Java. Everything you see on the display in a java pplication is a component. The abilit...
Face Recognition Technique Using PCA, Wavelet and SVM
We present a method of face recognition in which features are extracted by applying Principal component analysis on wavelet subband. Support vector machine and nearest distance methods are used for classification. Result...
Opinion Mining Classification Using Key Word Summarization Based on Singular Value Decomposition
With the popularity of online shopping it is increasingly becoming important for manufacturers and service providers to ask customers to review their product and associated service. Typically the number of customer revie...
Association Analaysis in Wireless Network using Trace data.
With the explosive growth in wireless devices like smart phones, PDA’s, netbooks, WLAN networks are usually overloaded at workplaces, social and home environments. Though a large number of mobility models have been propo...
Process Mining in Dyeing Unit Using Organizational Perspective: A Case Study
The basic idea of process mining is to extract knowledge from event logs recorded by an information system. Until recently, the information in these event logs was rarely used to analyze the underlying processes. Process...