scispace - formally typeset
Journal ArticleDOI

How to construct efficient signcryption schemes on elliptic curves

TLDR
This analysis shows that when compared with signaturethen-encryption on elliptic curves, signcryption on the curves represents a 58%saving in computational cost and a 40% saving in communication overhead.
About
This article is published in Information Processing Letters.The article was published on 1998-12-15. It has received 231 citations till now. The article focuses on the topics: Signcryption & Cryptography.

read more

Citations
More filters
Book ChapterDOI

On the Security of Joint Signature and Encryption

TL;DR: It is shown that gCCA2-security suffices for all known uses of CCA2-secure encryption, while no longer suffering from the definitional shortcomings of the latter.
Posted Content

New identity based signcryption schemes from pairings.

TL;DR: In this paper, a new identity-based scheme based on pairings over elliptic curves was proposed, which combines the functionalities of signature and encryption and is provably secure in the random oracle model.
Proceedings ArticleDOI

A new identity based signcryption scheme from pairings

TL;DR: In this paper, a new identity based scheme using pairings over elliptic curves is presented, which combines the functionalities of signature and encryption and is provably secure in the random oracle model.
Journal ArticleDOI

An efficient signcryption scheme with forward secrecy based on elliptic curve

TL;DR: In the proposed scheme, the judge can verify sender's signature directly without the sender's private key when dispute occurs, and the scheme can be applied to mobile communication environment more efficiently because of the low computation and communication cost.
Proceedings ArticleDOI

Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world

TL;DR: This paper argues that this is an important cryptographic primitive that must be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth, and presents an efficient IDRSC scheme based on bilinear pairing.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI

Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)

TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Journal ArticleDOI

Reducing elliptic curve logarithms to logarithms in a finite field

TL;DR: The main result of the paper is to demonstrate the reduction of the elliptic curve logarithm problem to the logarathm problem in the multiplicative group of an extension of the underlying finite field, thus providing a probabilistic subexponential time algorithm for the former problem.