We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Review of Elliptic Curve based Signcryption Schemes

by Anuj Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 6
Year of Publication: 2014
Authors: Anuj Kumar Singh
10.5120/17821-8769

Anuj Kumar Singh . A Review of Elliptic Curve based Signcryption Schemes. International Journal of Computer Applications. 102, 6 ( September 2014), 26-30. DOI=10.5120/17821-8769

@article{ 10.5120/17821-8769,
author = { Anuj Kumar Singh },
title = { A Review of Elliptic Curve based Signcryption Schemes },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 6 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number6/17821-8769/ },
doi = { 10.5120/17821-8769 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:33:20.831716+05:30
%A Anuj Kumar Singh
%T A Review of Elliptic Curve based Signcryption Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 6
%P 26-30
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-then-encryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of the signcryption schemes based on elliptic curves, since signcryption schemes based on elliptic curve cryptography saves more computational time and communication cost. Also, the elliptic curve based signcryption schemes are suitable for resource constrained applications. This work explores the advantages and limitations of the different signcryption schemes based on elliptic curves.

References
  1. William Stallings 1993. Cryptography and Network security: Principles and Practices. Prentice Hall Inc.
  2. M. Satyanarayanan, "Pervasive Computing : Vision and Challenges", IEEE Personal Communications, Volume 8 No. 4, pp. 10-17, 2001
  3. Scott A. Vanstone. 1997. Elliptic curve cryptosystem the answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report 2, pp 78-87.
  4. Yuliang Zheng. 1997. Digital signcryption or how to achieve cost(signature encryption) « cost(signature) + cost(encryption). In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '97, Springer-Verlag, pp. 165 -179.
  5. "Wikipedia". http://en. wikipedia. org/wiki/Signcryption, June 10, 2014
  6. M. Toorani. "Cryptanalysis of an Elliptic Curve-based Signcryption Scheme", International Journal of Network Security, Vol. 10, No. 1, pp. 51–56, 2010.
  7. Ram Shanmugam 1999. Elliptic curves and their applications to cryptography: An Introduction. Kluwer academic press.
  8. Lawrence C. Washington 2003. Elliptic Curves: Number Theory and Cryptography. CRC Press.
  9. Yuliang Zheng and Hideki Imai. "How to construct efficient signcryption schemes on elliptic curves", Information Processing Letters, Volume 68 No. 5, pp. 227 - 233, 1998.
  10. Yiliang Han, Xiaoyuan Yang and Yupu Hu. 2004. Signcryption Based on Elliptic Curve and Its Multi-Party Schemes. In roceedings of the 3rd international conference on Information security InfoSecu'04, pp. 216-217.
  11. Ren-Junn Hwang, Chih-Hua Lai, and Feng-Fu Su, "An effcient signcryption scheme with forward secrecy based on elliptic curve", Journal of Applied Mathematics and Computation, Volume 167 No. 2, pp. 870 - 881, 2005.
  12. Mohsen Toorani and Ali Asghar Beheshti Shirazi. 2008. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve. In Proceedings of International Conference on Computer and Electrical Engineering (ICCEE'08), pp. 428-432.
  13. Yiliang Han, Xiaoyuan Yang, Ping Wei, Yuming Wang, Yupu Hu, "ECGSC: Elliptic Curve Based Generalized Signcryption", Ubiquitous Intelligence and Computing- Lecture Notes in Computer Science Volume 4159, 2006, pp 956-965.
  14. E. Mohamed and H. Elkamchouchi, "Elliptic Curve Signcryption with Encrypted Message Authentication and Forward Secrecy", International Journal of Computer Science and Network Security, VOL. 9 No. 1, pp 395-398, 2009.
  15. Mohsen Toorani and Ali Asghar Beheshti Shirazi, "An elliptic curve-based signcryption scheme with forward secrecy", Journal of Applied Sciences, Volume 9 No. 6, pp. 1025 -1035, 2010.
  16. Esam A. A. A. Hagras, Doaa El-Saied, Dr. Hazem H. Aly, "A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme for Heterogeneous Wireless Sensor Networks", International Journal of Computer Science and Technology, Volume 2 No 2, pp 19-23, 2011.
  17. Ramratan Ahirwal, Anjali Jain, Y. K. Jain, "Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation", International Journal of Computer Applications, Volume 62 No. 9, pp. 41-48, 2013.
  18. Sumanjit Das, Biswajit Samal, " An Elliptic Curve based Signcryption Protocol using Java", International Journal of Computer Applications, Volume 66 No. 4, pp. 44-49, 2013.
  19. F. Amounas, H. Sadki and E. H. El Kinani, "An Efficient Signcryption Scheme based on The Elliptic Curve Discrete Logarithm Problem", International Journal of Information & Network Security, Volume 2 No. 3, pp. 253-259, 2013.
  20. Suman Bala, Gaurav Sharma and Anil K. Verma, "An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks", Lecture Notes in Electrical Engineering (Springer Link), Volume 215, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Signcryption Elliptic Curve Cryptography Encryption Authentication.