HYPER-ELLIPTIC CURVE BASED SIGNCRYPTION SCHEMES FOR RESOURCE CONSTRAINT DEVICES IN IOT
نویسندگان
چکیده
منابع مشابه
A Review of Elliptic Curve based Signcryption Schemes
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of...
متن کاملECGSC: Elliptic Curve based Generalized Signcryption Scheme
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and encryption. The definition of generalized signcryption is proposed in the paper firstly. Generalized signcryption has a special feature that provides confidentiality or authenticity separately under the condition of specific inputs. So it is more useful than common ones. Based on ECDSA...
متن کاملSecure Signcryption on Hyper Elliptic Curve with Sensor-Based Random Number
The emerging trend now in network security is efficient signcryption which is due to the growth of wireless technology. Signcryption scheme is proposed with security features such as confidentiality, integrity(originality of sender and receiver), message and user authentication, non-repudiation, forward secrecy and public verifiability. Signcryption fulfils the functions of signature and encryp...
متن کاملCryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although several signcryption schemes are proposed over the years, some of them are proved to have security problems. In this paper, the security of Han et al.’s signcryption scheme is analyzed, and it is proved that it has ma...
متن کاملA Signcryption Scheme based on Elliptic Curve Cryptography
In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INFORMATION TECHNOLOGY IN INDUSTRY
سال: 2021
ISSN: 2203-1731
DOI: 10.17762/itii.v9i1.135