PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY

被引:0
|
作者
Elkamchouchi, Hassan M.
Elhamshary, Amira S.
机构
关键词
Authentication; Digital signature; Encryption; Public Key Cryptography; Security; Signcryption; Partial Signcryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Partial signcryption is a new idea for calculation saving. A remarkable property of a partial signcryption scheme is that is fulfills the function of public key signcryption, with a cost significantly smaller than that required by signcryption. The purposes of this paper are to demonstrate how to specify partial signcryption schemes before and after applying elliptic curves over finite fields, and to examine the efficiency of such schemes. The analysis shows that when compared with signcryption, partial signcryption represents a 0% saving in computational cost and 50.2% saving in communication overhead for minimum number of blocks (2 blocks of message).
引用
收藏
页码:641 / 647
页数:7
相关论文
共 50 条
  • [41] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [42] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [43] Elliptic Curve Signcryption Based Security Protocol for RFID
    Singh, Anuj Kumar
    Patro, B. D. K.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
  • [44] A Review of Signcryption Schemes Based on Hyper Elliptic Curve
    Ullah, Shamsher
    Li, Xiang-Yang
    Zhang, Lan
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 51 - 58
  • [45] An Efficient Elliptic Curve Based Signcryption Scheme for Firewalls
    Iqbal, Waseem
    Afzal, Mehreen
    Ahmad, Farhan
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 67 - 72
  • [46] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [47] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [48] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [49] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    MATHEMATICS, 2023, 11 (22)
  • [50] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283