We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Elliptic Curve based Signcryption Protocol using Java

by Sumanjit Das, Biswajit Samal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 4
Year of Publication: 2013
Authors: Sumanjit Das, Biswajit Samal
10.5120/11076-6002

Sumanjit Das, Biswajit Samal . An Elliptic Curve based Signcryption Protocol using Java. International Journal of Computer Applications. 66, 4 ( March 2013), 44-49. DOI=10.5120/11076-6002

@article{ 10.5120/11076-6002,
author = { Sumanjit Das, Biswajit Samal },
title = { An Elliptic Curve based Signcryption Protocol using Java },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 4 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number4/11076-6002/ },
doi = { 10.5120/11076-6002 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:30.297315+05:30
%A Sumanjit Das
%A Biswajit Samal
%T An Elliptic Curve based Signcryption Protocol using Java
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 4
%P 44-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an unreliable network then data may not be secure. There are many techniques to secure data or message. Signcryption is one of the booming issues in the field of security. In 1997 Zheng introduce signcryption scheme by combining the techniques of digital signature then encryption in one step which reduces the computational cost and communication overhead [1]. Signcryption also verifies the sender without reading content of the message by third party [10]. Many researchers have given their signcryption scheme to achieve security goals like forward secrecy, like confidentiality, unforgeability, integrity, forward secrecy and public verification non repudiation but many of them having their own limitations [2, 8, 16]. In this paper a novel signcryption scheme proposed which is implemented using java and also achieves all the security goals.

References
  1. Yuliang Zheng. Digital signcryption or how to achieve cost (signature encryption)Cost (signature), Cost (encryption). In CRYPTO '97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 165-179, London, UK, 1997. Springer-Verlag.
  2. F. Bao, R. H. Deng, "A signcryption scheme with signature directly verifiable by public key", Proceedings of PKC'98, LNCS 1431, Springer-Verlag, 1998, pp. 55–59.
  3. Yuliang Zheng and Hideki Imai. How to construct efficient signcryption schemes on elliptic curves. Inf. Process. Lett. , 68(5):227-233, 1998.
  4. William Stallings. Cryptography and Network security: Principles and Practices. Prentice Hall Inc. , second edition, 1999.
  5. Gamage, C. , J. Leiwo, Encrypted message authentication by firewalls. Proceedings of International Workshop on Practice of Theory in Public Key Cryptography, Berlin, 69-81, 1999.
  6. Jung. H. Y,K. S Chang, D. H Lee and J. I. Lim, Signcryption scheme with forward secrecy. Proceeding of Information Security Application-WISA, Korea, 403-475, 2001.
  7. X. Yang Y. Han and Y. Hu. Signcryption based on elliptic curve and its multi-party schemes. Proceedings of the 3rd ACM International Conference on Information Security (InfoSecu 04), pages 216-217, 2004.
  8. Henri Cohen and Gerhard Frey, editors. Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, 2005.
  9. Hwang Lai Su. An efficient signcryption scheme with forward secrecy based on elliptic curve. Journal of applied mathematics and computation, pages 870-881, 2005.
  10. LEI Feiyu, CHEN Wen, CHEN Kefei, "A generic solution to realize public verifiability of signcryption", Wuhan University Journal of Natural Sciences, Vol. 11, No. 6, 2006, 1589-1592.
  11. Mohsen Toorani and Ali Asghar Beheshti Shirazi. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve. Computer and Electrical Engineering, International Conference on, 428-432, 2008.
  12. Mohsen Toorani and Ali Asghar Beheshti Shirazi. An elliptic curve-based signcryption scheme with forward secrecy. Journal of Applied Sciences, 9(6):1025 -1035, 2009.
  13. Mohsen Toorani and Ali Asghar Beheshti Shirazi. Cryptanalysis of an elliptic curve-based signcryption scheme. International journal of network security vol. 10, pp 51-56,2010.
  14. Wang Yang and Zhang. Provable secure generalized signcryption. Journal of computers, vol. 5, pp 807-814, 2010.
  15. Prashant Kushwah1 and Sunder Lal2, Provable secure identity based signcryption schemes without random oracles, International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 3, May 2012.
  16. Sumanjit Das and Prasant Sahoo, cryptanalisys of signcryption protocols based on elliptic curve. IJMER,Vol. 3, Issue-1, pp 89-92, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography forward secrecy signcryption ECC.