PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY

被引:0
|
作者
Elkamchouchi, Hassan M.
Elhamshary, Amira S.
机构
来源
2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3 | 2012年
关键词
Authentication; Digital signature; Encryption; Public Key Cryptography; Security; Signcryption; Partial Signcryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Partial signcryption is a new idea for calculation saving. A remarkable property of a partial signcryption scheme is that is fulfills the function of public key signcryption, with a cost significantly smaller than that required by signcryption. The purposes of this paper are to demonstrate how to specify partial signcryption schemes before and after applying elliptic curves over finite fields, and to examine the efficiency of such schemes. The analysis shows that when compared with signcryption, partial signcryption represents a 0% saving in computational cost and 50.2% saving in communication overhead for minimum number of blocks (2 blocks of message).
引用
收藏
页码:641 / 647
页数:7
相关论文
共 50 条
  • [21] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [23] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167
  • [24] A Critical Review on Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 13 - 18
  • [25] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [26] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [27] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [28] An hyper elliptic curve based efficient signcryption scheme for user authentication
    Devarajan, Malathi
    Sasikaladevi, N.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (06) : 8487 - 8498
  • [29] Zero Knowledge Proof in Secret Sharing Scheme Using Elliptic Curve Cryptography
    Sardar, Anususya
    Rao, Subba Y., V
    RukmaRekha, N.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 220 - 226
  • [30] A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Kumar, Neeraj
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (12) : 6428 - 6453