slugStudy of Signcryption and ECC scheme

Abstract

the explosive growth is the use of mobile devices demands a new generation of PKC scheme that includes limitations of power and bandwidth at the same time to provide sufficient level of security for such devices, the functionality of encryption and digital signature in a single process is known as signcryption to achieve security. It decreases the computational costs and communication overheads in comparison with the established signature then encryption schemes. ECC is another technique of PKC which used to reduce the computational cost of your daily life used devices which consumes, more power, like laptops, tabs, PDA ect, it also reduce the key size, this paper examines the use of ECC and signcryption in such constrained environment and discusses the basics of ECC and signcryption security, and lastly it explore the performance, survey and use of signcryption techniques.

Authors and Affiliations

Reenu saini, Mamta tewari

Keywords

Related Articles

LTE Techniques in 4G Wireless System Using Protocol Stack

LTE, an acronym for Long-Term Evolution. 4G LTE is a standard for wireless broadband technology designed to support roaming Internet access via cell phones and handheld devices. Due to the requirements on high data rate...

Review on CMOS Technology &Various Sources of Power Dissipation in CMOS Devices

The historical background of Electronics Industry tells about the integration of more and more components in a chip to enhance the processing speed and efficiency of any device can be improved. But at the same time, the...

Modelling and Simulation of Dc to Ac Converter for Renewable Energy Source Using Simulink

This paper deals with modeling and simulation of DC-AC converter for Renewable Energy Source. DC from the solar cell is stepped up using a Boost converter. The output of the Boost converter is converted in to three-phas...

slugLEXICAL ANALYSIS FOR THE MEASUREMENT OF CONCEPTUAL DUPLICITY BETWEEN C PROGRAMS

Plagiarism in programming assignment is major problem which motivate the need of faster detection approach then manual checking. Detecting source code plagiarism in programming assignments throug...

Compiler Designing

Need of advancement in techniques of interpretation and run time compilation increases day by day to handle the complexities of daily life problems. In order to reduce the complexity of designing and building computers...

Download PDF file
  • EP ID EP18273
  • DOI -
  • Views 257
  • Downloads 14

How To Cite

Reenu saini, Mamta tewari (2014). slugStudy of Signcryption and ECC scheme. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18273