CFP last date
20 December 2024
Reseach Article

A Tripartite Signcryption Scheme with Applications to E-Commerce

by Yasmine Abouelseoud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 15
Year of Publication: 2013
Authors: Yasmine Abouelseoud
10.5120/13323-0842

Yasmine Abouelseoud . A Tripartite Signcryption Scheme with Applications to E-Commerce. International Journal of Computer Applications. 76, 15 ( August 2013), 33-38. DOI=10.5120/13323-0842

@article{ 10.5120/13323-0842,
author = { Yasmine Abouelseoud },
title = { A Tripartite Signcryption Scheme with Applications to E-Commerce },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 15 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number15/13323-0842/ },
doi = { 10.5120/13323-0842 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:59.057476+05:30
%A Yasmine Abouelseoud
%T A Tripartite Signcryption Scheme with Applications to E-Commerce
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 15
%P 33-38
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Achieving confidentiality and authentication in e-commerce transactions are among the primary security goals. In this paper, a new cryptographic scheme is proposed which guarantees the authenticity of the customer and ensures the confidentiality of the communications among the bank, the merchant and the customer. The proposed solution is the use of a tripartite signcryption scheme with low computational and communications overhead. A variant of the proposed scheme that enables a firewall to authenticate the origin of the ciphertext without disclosure of the contents of the original plaintext message is also presented.

References
  1. SetCo 1997. Secure Electronic Transaction Specification: Business Description.
  2. Y. Zheng 1997. Digital Signcryption or How to Achieve Cost (Signature and Encryption) Cost (Signature) + Cost (Encryption). Advances in Cryptology, LNCS, Vol. 1294. Springer-Verlag. pp. 165–179.
  3. F. Li, Y. Hu and S. Liu 2006. Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. In Proceedings of the 2nd Chinese Conference on Trusted Computing and Information Security (CTCIS'06), China.
  4. S. Duan and Z. Cao 2006. Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. L. Batten and R. Safavi-Naini (Eds. ), ACISP 2006. Springer-Verlag. LNCS 4058, pp. 195-206.
  5. J. H. Silverman 1986. The Arithmetic of Elliptic Curves. GTM 106. Springer-Verlag.
  6. A. Menezes, T. Okamoto and S. Vanstone 1993. Reducing Elliptic Curve Logarithm to Logarithms in a Finite Field. IEEE Transactions on Information Theory, vol. 39, pp. 1639-1646.
  7. G. Frey and H. Ruck 1994. A Remark Concerning m-divisibility and the Discrete Logarithm Problem in the Divisor Class Group of Curves. Mathematics of Computation. Vol. 62, pp. 865-874.
  8. Standards for Efficient Cryptography 2000, SEC 2: Recommended Elliptic Curves Domain Parameters, Certicom Research, Version 1. 0.
  9. A. Joux 2002. The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. In Proceedings of the Fifth Algorithmic Number Theory Symposium. LNCS. Springer-Verlag.
  10. D. Boneh and M. Franklin 2001. Identity Based Encryption from the Weil Pairing, In Advances in Cryptology- CRYPTO 2001, LNCS 2139. Springer.
  11. V. Miller 2004. The Weil Pairing and Its Efficient Calculation. Journal of Cryptology, vol. 17(4), pp. 235-262.
  12. B. Lynn 2007. On the Implementation of Pairing-Based Cryptosystems, PhD thesis, Stanford University.
  13. H. L. McKinley 2003. SSL and TLS: A Beginner's Guide. SANS Institute.
  14. Z. Boping , and S. Shiyu 2009. An Improved SET Protocol. Proceedings of the 2009 International Symposium on Information Processing (ISIP'09). Huangshan, P. R. China. pp. 267-272
Index Terms

Computer Science
Information Sciences

Keywords

Public key cryptography Signcryption E-commerce.