International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access

ABSTRACT

Title : A Study on signcryption Scheme Based on Eliptic Curve
Authors : Anjali Pandey, Sumanjit Das
Keywords : elliptic curve cryptography, signcryption, digital signature and encryption.
Issue Date : July 2013
Abstract :
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure communication network is a crucial issue for the reason that it may get tempered by third party [1]. Everyone desires their messages must be travel in the network in a secure fashion. The message does not tempered by any unauthorized one. So our focal is how we can add more security to the messages than the existing so that it can fulfill the user requirements without any damage. There are various cryptographic techniques be present which offers security to the messages [2]. Traditional Signature then encryption technique is responsible for security to the messages by performing signature scheme and encryption scheme in two unlike logical steps. As it achieves signature and encryption scheme in two unlike logical steps it takes more computational cost and communication overhead. The novel technique titled as “signcryption” by Yuling Zheng, accomplishes both the functionality of signature scheme and encryption scheme in single logical step with a reduced amount of computational and communication cost than Signature-then-encryption scheme [1]. A number of signcryption schemes are previously announced by many researchers Nonetheless each scheme has their own restriction [2]. This paper contain cryptanalysis of different signcryption schemes based on the security goals like integrity, authentication, confidentiality, unforgeability beside that forward secrecy and public verification., where one can confirm the sender signature without reading the content of messages since the messages is in encrypted format and the cannot be able to mine the original message content even if the long-term private key of the sender is compromised [4].
Page(s) : 997-1003
ISSN : 2229-3345
Source : Vol. 4, Issue.7

Copyright © 2010-2024 IJCSET KEJA Publications