slugStudy of Signcryption and ECC scheme

Abstract

the explosive growth is the use of mobile devices demands a new generation of PKC scheme that includes limitations of power and bandwidth at the same time to provide sufficient level of security for such devices, the functionality of encryption and digital signature in a single process is known as signcryption to achieve security. It decreases the computational costs and communication overheads in comparison with the established signature then encryption schemes. ECC is another technique of PKC which used to reduce the computational cost of your daily life used devices which consumes, more power, like laptops, tabs, PDA ect, it also reduce the key size, this paper examines the use of ECC and signcryption in such constrained environment and discusses the basics of ECC and signcryption security, and lastly it explore the performance, survey and use of signcryption techniques.

Authors and Affiliations

Reenu saini, Mamta tewari

Keywords

Related Articles

Parking Management Systems and Their Technologies - A Review

The number of personal vehicle usage is ever increasing; so is the number of people going to shop in malls. Finding a parking space in most shopping complexes, especially during the rush hours, is difficult for drivers....

Comparison of Digital Image Inpainting Techniques Based on SSIM

Digital Image Inpainting is a technique used to repair a damaged region of an image in such a way that it appears natural and continuous to an observer who is seeing it for the first time. Image inpainting is an importa...

slugScheduling Algorithms Implementation for LTE Downlink

The increasing demand for cellular communications leads to the development of Long Term Evolution (LTE). LTE is the evolution for existing 3G mobile networks which offers higher capacity, efficient utilization of radio...

A Review of Clustering Technique Based on Different Optimization Function Using for Selection of Center Point

The selection of center point is major issue in clustering technique. the center point of cluster decides the quality and validation of clustering technique. for the better selection of clustering technique used differe...

Fault Tolerant Protocol for UDS Flash Programming through Controller Area Network (CAN)

This paper proposes a fault tolerant protocol for CAN (Control Area Network) flash programming. Recently, the need of CAN flash programming is rapidly increasing because the number of installed ECU (Electronic Control...

Download PDF file
  • EP ID EP18273
  • DOI -
  • Views 279
  • Downloads 14

How To Cite

Reenu saini, Mamta tewari (2014). slugStudy of Signcryption and ECC scheme. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(6), -. https://europub.co.uk/articles/-A-18273