Coded Modulation and the Arrival of Signcryption

被引:0
|
作者
Zheng, Yuliang [1 ]
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
来源
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES | 2009年 / 23卷
关键词
Coded modulation; digital signature; hybrid encryption; public key cryptography; signcryption; IDENTITY-BASED SIGNCRYPTION; REDUNDANT SIGNAL SETS; IDENTIFICATION; SECURITY;
D O I
10.3233/978-1-60750-002-5-17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital communications engineers strive to transmit data in a more efficient and reliable manner, while cryptographers endeavor to offer both data confidentiality and integrity. In the 1970's and 1980's, researchers in digital communications successfully developed techniques for multi-level coded modulation that simultaneously allow the correct of transmissions errors and the demodulation of signals upon the arrival at the receiver. Reminiscent of coded modulation, signcryption is a cryptographic technique developed to "hit two birds in one stone", namely to provide both data confidentiality and origin unforgeability with reduced overhead. In this article the author recounts his unique experience in witnessing the evolution and perfection of coded modulation techniques, and more important, how the experience inspired him to embark on the journey of searching for efficient techniques for combining public key encryption and digital signatures; the author also attempts to illuminate future directions for efficient, hybrid cryptographic techniques.
引用
收藏
页码:17 / 27
页数:11
相关论文
共 50 条
  • [21] HOOSC: heterogeneous online/offline signcryption for the Internet of Things
    Saeed, Mutaz Elradi S.
    Liu, Qingyin
    Tian, GuiYun
    Gao, Bin
    Li, Fagen
    WIRELESS NETWORKS, 2018, 24 (08) : 3141 - 3160
  • [22] Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) plus cost(encryption)
    Zheng, YL
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 165 - 179
  • [23] Known session key attack against a collection of signcryption schemes
    Wong, DS
    Wong, J
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 119 - 124
  • [24] Relay-Assisted Joint Coded Modulation
    Teng, Zi
    Wu, Jun
    Cui, Hao
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (04) : 356 - 359
  • [25] On block-coded modulation with interblock memory
    Lin, MC
    Wang, JY
    Ma, SC
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1997, 45 (11) : 1401 - 1411
  • [26] Information theoretic foundations of adaptive coded modulation
    Caire, Giuseppe
    Kumar, K. Rai
    PROCEEDINGS OF THE IEEE, 2007, 95 (12) : 2274 - 2298
  • [27] A note on lattice quantized coded modulation method
    Minami, N
    Wakasugi, K
    Kasahara, M
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 1995, 78 (12): : 18 - 26
  • [28] Nonbinary LDPC-Coded Spatial Modulation
    Feng, Dan
    Xu, Hengzhou
    Zheng, Jianping
    Bai, Baoming
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (04) : 2786 - 2799
  • [29] LDPC Coded Modulation for TLC Flash Memory
    Lee, Huang-Chang
    Shy, Jieng-Heng
    Chen, Yen-Ming
    Ueng, Yeong-Luh
    2017 IEEE INFORMATION THEORY WORKSHOP (ITW), 2017, : 204 - 208
  • [30] Coded modulation for satellite digital video broadcasting
    MorelosZaragoza, R
    Takeshita, OY
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (09) : 1355 - 1360