slugStudy of Signcryption and ECC scheme

Abstract

the explosive growth is the use of mobile devices demands a new generation of PKC scheme that includes limitations of power and bandwidth at the same time to provide sufficient level of security for such devices, the functionality of encryption and digital signature in a single process is known as signcryption to achieve security. It decreases the computational costs and communication overheads in comparison with the established signature then encryption schemes. ECC is another technique of PKC which used to reduce the computational cost of your daily life used devices which consumes, more power, like laptops, tabs, PDA ect, it also reduce the key size, this paper examines the use of ECC and signcryption in such constrained environment and discusses the basics of ECC and signcryption security, and lastly it explore the performance, survey and use of signcryption techniques.

Authors and Affiliations

Reenu saini, Mamta tewari

Keywords

Related Articles

Congestion-Aware Bandwidth Assignment In Wireless Mesh Networks

Engineering the network capacity requires a complex cross-layer design in multi-radio multi-channel wireless mesh networks. A decoupling approach that breaks down the entire design space into routing and initial channel...

Methods for Character Identification in Movies: A Review

Now a day’s character Identification from films is a very challenging task due to the huge variation in the appearance of each & every character. It will lead significant research interests and may have many interesting...

Design and Development of Automatic Wire Cutting Machine: A Case Study in Small Scale Industry

This Paper gives the detailed information about the design and development of automatic wire cutting machine. At present conventional method is used for wire cutting and measuring which takes more time which requires ma...

Comparison between Neural Network and Fuzzy Logic on Assessment of Long Term Concrete Compressive Strength and Expansion Due To Sulfate Attack

This study is divided into two phases. Phase I includes assessment of the validation of neural network and fuzzy logic in predicting mortar and concrete properties due to sulfate attack. These properties include expansi...

slugSurvey on Video Based Fire Detection Systems

Detecting break out of fire rapidly is vital for prevention of material damage and human casualties. Traditional point sensors detect heat or smoke particles and are quite successful for indoor fire detection. They will...

Download PDF file
  • EP ID EP18273
  • DOI -
  • Views 268
  • Downloads 14

How To Cite

Reenu saini, Mamta tewari (2014). slugStudy of Signcryption and ECC scheme. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18273