Coded Modulation and the Arrival of Signcryption

被引:0
|
作者
Zheng, Yuliang [1 ]
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
来源
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES | 2009年 / 23卷
关键词
Coded modulation; digital signature; hybrid encryption; public key cryptography; signcryption; IDENTITY-BASED SIGNCRYPTION; REDUNDANT SIGNAL SETS; IDENTIFICATION; SECURITY;
D O I
10.3233/978-1-60750-002-5-17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital communications engineers strive to transmit data in a more efficient and reliable manner, while cryptographers endeavor to offer both data confidentiality and integrity. In the 1970's and 1980's, researchers in digital communications successfully developed techniques for multi-level coded modulation that simultaneously allow the correct of transmissions errors and the demodulation of signals upon the arrival at the receiver. Reminiscent of coded modulation, signcryption is a cryptographic technique developed to "hit two birds in one stone", namely to provide both data confidentiality and origin unforgeability with reduced overhead. In this article the author recounts his unique experience in witnessing the evolution and perfection of coded modulation techniques, and more important, how the experience inspired him to embark on the journey of searching for efficient techniques for combining public key encryption and digital signatures; the author also attempts to illuminate future directions for efficient, hybrid cryptographic techniques.
引用
收藏
页码:17 / 27
页数:11
相关论文
共 50 条
  • [1] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [2] A code-based hybrid signcryption scheme
    Klamti, Jean Belo
    Hasan, M. Anwarul
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2023, 17 (01)
  • [3] A new efficient signcryption scheme in the standard model
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (05) : 778 - 789
  • [4] Signcryption and its applications in efficient public key solutions
    Zheng, YL
    INFORMATION SECURITY, 1998, 1396 : 291 - 312
  • [5] Key-Insulated Signcryption
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2013, 19 (10) : 1351 - 1374
  • [6] Efficient Constructions of Signcryption Schemes and Signcryption Composability
    Matsuda, Takahiro
    Matsuura, Kanta
    Schuldt, Jacob C. N.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 321 - 342
  • [7] Efficient distributed signcryption scheme as group signcryption
    Kwak, DJ
    Moon, SJ
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 403 - 417
  • [8] Noncoherent-Coded Modulation Constructed from Conventional Trellis-Coded Modulation
    Wei, Ruey-Yi
    Lin, Mao-Chao
    IEEE COMMUNICATIONS LETTERS, 1998, 2 (09) : 260 - 262
  • [9] Constrained Interleaved Coded Modulation
    Hu, Yuan
    Fonseka, John P.
    Dowling, Eric M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (04) : 3501 - 3506
  • [10] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446