Coded Modulation and the Arrival of Signcryption

被引:0
作者
Zheng, Yuliang [1 ]
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
来源
ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES | 2009年 / 23卷
关键词
Coded modulation; digital signature; hybrid encryption; public key cryptography; signcryption; IDENTITY-BASED SIGNCRYPTION; REDUNDANT SIGNAL SETS; IDENTIFICATION; SECURITY;
D O I
10.3233/978-1-60750-002-5-17
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital communications engineers strive to transmit data in a more efficient and reliable manner, while cryptographers endeavor to offer both data confidentiality and integrity. In the 1970's and 1980's, researchers in digital communications successfully developed techniques for multi-level coded modulation that simultaneously allow the correct of transmissions errors and the demodulation of signals upon the arrival at the receiver. Reminiscent of coded modulation, signcryption is a cryptographic technique developed to "hit two birds in one stone", namely to provide both data confidentiality and origin unforgeability with reduced overhead. In this article the author recounts his unique experience in witnessing the evolution and perfection of coded modulation techniques, and more important, how the experience inspired him to embark on the journey of searching for efficient techniques for combining public key encryption and digital signatures; the author also attempts to illuminate future directions for efficient, hybrid cryptographic techniques.
引用
收藏
页码:17 / 27
页数:11
相关论文
共 50 条
  • [31] Robust Reed Solomon Coded MPSK Modulation
    Husni, Emir M.
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2010, 4 (02) : 95 - 114
  • [32] Coded modulation for satellite digital video broadcasting
    MorelosZaragoza, R
    Takeshita, OY
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (09) : 1355 - 1360
  • [33] Certificateless Signcryption in the Standard Model
    Zhou, Caixue
    Gao, Guangyong
    Cui, Zongmin
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 92 (02) : 495 - 513
  • [34] Efficient Signcryption for Heterogeneous Systems
    Li, Fagen
    Zhang, Hui
    Takagi, Tsuyoshi
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 420 - 429
  • [35] Heterogeneous Signcryption with Key Privacy
    Huang, Qiong
    Wong, Duncan S.
    Yang, Guomin
    COMPUTER JOURNAL, 2011, 54 (04) : 525 - 536
  • [36] Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
    Khan, Junaid
    Zhu, Congxu
    Ali, Wajid
    Asim, Muhammad
    Ahmad, Sadique
    INFORMATION, 2024, 15 (05)
  • [37] Improvements BER with convolutional codes and multilevel coded modulation
    Niculescu, Marius-Cristian
    Niculescu, Elena
    ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 133 - +
  • [38] Approaching Shannon capacity limit using coded modulation
    Batshon, Hussam G.
    NEXT-GENERATION OPTICAL COMMUNICATION: COMPONENTS, SUB-SYSTEMS, AND SYSTEMS VII, 2018, 10561
  • [39] Coded Modulation with a Constraint on the Minimum Channel Symbol Duration
    Mengi, Anil
    Vinck, A. J. Han
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1544 - 1548
  • [40] Trellis Coded Optical Modulation Using QAM Constellations
    de Gabory, Emmanuel Le Taillandier
    Nakamura, Tatsuya
    Noguchi, Hidemi
    Maeda, Wakako
    Fujita, Sadao
    Abe, Jun'ichi
    Fukuchi, Kiyoshi
    2016 21ST OPTOELECTRONICS AND COMMUNICATIONS CONFERENCE (OECC) HELD JOINTLY WITH 2016 INTERNATIONAL CONFERENCE ON PHOTONICS IN SWITCHING (PS), 2016,