Journal ArticleDOI
How to construct efficient signcryption schemes on elliptic curves
Yuliang Zheng,Hideki Imai +1 more
TLDR
This analysis shows that when compared with signaturethen-encryption on elliptic curves, signcryption on the curves represents a 58%saving in computational cost and a 40% saving in communication overhead.About:
This article is published in Information Processing Letters.The article was published on 1998-12-15. It has received 231 citations till now. The article focuses on the topics: Signcryption & Cryptography.read more
Citations
More filters
Book ChapterDOI
On the Security of Joint Signature and Encryption
TL;DR: It is shown that gCCA2-security suffices for all known uses of CCA2-secure encryption, while no longer suffering from the definitional shortcomings of the latter.
Posted Content
New identity based signcryption schemes from pairings.
TL;DR: In this paper, a new identity-based scheme based on pairings over elliptic curves was proposed, which combines the functionalities of signature and encryption and is provably secure in the random oracle model.
Proceedings ArticleDOI
A new identity based signcryption scheme from pairings
TL;DR: In this paper, a new identity based scheme using pairings over elliptic curves is presented, which combines the functionalities of signature and encryption and is provably secure in the random oracle model.
Journal ArticleDOI
An efficient signcryption scheme with forward secrecy based on elliptic curve
TL;DR: In the proposed scheme, the judge can verify sender's signature directly without the sender's private key when dispute occurs, and the scheme can be applied to mobile communication environment more efficiently because of the low computation and communication cost.
Proceedings ArticleDOI
Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world
TL;DR: This paper argues that this is an important cryptographic primitive that must be used to protect privacy and authenticity of a collection of users who are connected through an ad-hoc network, such as Bluetooth, and presents an efficient IDRSC scheme based on bilinear pairing.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
A public key cryptosystem and a signature scheme based on discrete logarithms
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Book ChapterDOI
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption)
TL;DR: Signcryption as discussed by the authors is a new cryptographic primitive which simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step, and with a cost significantly lower than that required by signature-then-encryption.
Journal ArticleDOI
Reducing elliptic curve logarithms to logarithms in a finite field
TL;DR: The main result of the paper is to demonstrate the reduction of the elliptic curve logarithm problem to the logarathm problem in the multiplicative group of an extension of the underlying finite field, thus providing a probabilistic subexponential time algorithm for the former problem.