Skip to main content
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the hardness of q-Diffie-Hellman problems in Gap Diffie-Hellman groups. This new scheme is quite efficient: the signcryption operation has almost... more
    • by 
    •   4  
      Provable SecuritySigncryptionRandom Oracle ModelAuthenticated Encryption
We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available(i.e., off-line stage) and the on-line part of our scheme does not require any exponent... more
    • by 
    •   6  
      CryptographyProvable SecurityLineDigital Signatures
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed... more
    • by  and +1
    •   2  
      SigncryptionElliptic Curve Cryptography
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and... more
    • by 
    •   6  
      Digital SignatureEncryptionOutsider ArtSigncryption
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver.... more
    • by 
    •   4  
      CryptanalysisProvable SecuritySigncryptionRandom Oracle Model
The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data... more
    • by 
    •   3  
      ECCSigncryptionIJMER
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed... more
    • by 
    •   2  
      SigncryptionElliptic Curve Cryptography
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based cryptography uses any arbitrary... more
    • by 
    •   5  
      Security RequirementsSigncryptionECDLPIdentity Based Cryptography
Hyper elliptical curve cryptography is the prominent public key encrypto systems with practical approach to high level of security and shorter bit size of encryption. Public key encryption is a reliable cryptographic method for mobile... more
    • by 
    •   4  
      SecurityManetSigncryptionKey escrow
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption... more
    • by 
    •   5  
      PrivacyInvisibleKeySigncryption
Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after... more
    • by 
    •   5  
      Public Key InfrastructureCryptanalysisProvable SecuritySigncryption
Chaos is one type of complex dynamic behaviour generated by determined nonlinear dynamic systems.Chaos functions have mainly used to develop mathematical models of non linear systems .Chaotic systems have many important properties, such... more
    • by 
    •   6  
      CryptographyEncryptionHash FunctionsChaos
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based... more
    • by 
    •   5  
      MathematicsComputer ScienceEncryptionSigncryption
    • by 
    •   6  
      Computer ScienceSecurityThe Internet of ThingsInternet of Things (IoT)
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
Most of the existing hierarchical secret-sharing schemes are unconditionally (non-cryptographically) secured, and they cannot survive from various types of attacks especially when the participants use resource-constrained wireless mobile... more
    • by 
    •   4  
      Distributed ComputingSecurity CommunicationSigncryptionElliptic Curve Cryptography
Natural and man-made catastrophic events appear be steadily increasing in intensity and frequency. Proper preparation, response and recovery are essential if mankind and its vital systems are to cope with and survive large-scale... more
    • by 
    •   56  
      Information SystemsDistributed ComputingSystem IdentificationSemantics
In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has... more
    • by  and +1
    •   3  
      SecurityThe Internet of ThingsSigncryption
This article proposes a hybrid certificateless signcryption scheme that is secure against adaptive chosen ciphertext adversary in the random oracle model. The scheme combines an asymmetric encryption which is one way against chosen... more
    • by 
    •   5  
      Computer ScienceDistributed ComputingSigncryptionElectrical And Electronic Engineering
An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost... more
    • by 
    •   7  
      Computer ScienceDigital SignatureSigncryptionSignature
Mobile communication and Mobile Commerce is most famous nowadays as a result of the administration offered amid the portability. In any case, notwithstanding of its new headways, versatile correspondence has been confronting numerous... more
    • by 
    •   7  
      Information SecurityMobile CommerceComputer SecurityCryptography
... Dr Faisal Bashir Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi, Pakistan [email protected] Dr Asif Masood Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi,... more
    • by 
    •   11  
      Computer SciencePrivacyComputer SecurityCryptography
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a mobile network. In this paper, we present the notion of... more
    • by 
    •   13  
      PrivacyComputer NetworksCryptographyMobile Communication
    • by 
    •   3  
      SecurityThe Internet of ThingsSigncryption
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT infrastructure investment costs. It... more
    • by 
    •   3  
      Cloud ComputingElliptic curvesSigncryption