Signcryption
4 Followers
Recent papers in Signcryption
This paper proposes a new public key authenticated encryption (signcryption) scheme based on the hardness of q-Diffie-Hellman problems in Gap Diffie-Hellman groups. This new scheme is quite efficient: the signcryption operation has almost... more
We present an identity-based on-line/off-line signcryption scheme, where most of computations are carried out when the message is not available(i.e., off-line stage) and the on-line part of our scheme does not require any exponent... more
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and... more
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver.... more
The security of data become a major issue in the present days, there are different dimensions of security in this paper we will discuss one of the major properties of security. The signcryption is one of the techniques to secure your data... more
Electronic commerce, as exemplified by the popularity of the Internet, is becoming more important along with fast progress in communications and information technology. The SET (Secure Electronic Transaction) protocol is a scheme designed... more
The certificate-based cryptosystems is traditional way in providing the system parameters. Identity-based cryptography is more efficient than certificate-based cryptosystems. Each user in identity-based cryptography uses any arbitrary... more
Hyper elliptical curve cryptography is the prominent public key encrypto systems with practical approach to high level of security and shorter bit size of encryption. Public key encryption is a reliable cryptographic method for mobile... more
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption... more
Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden and thus the validity of the ciphertext can be verified only after... more
Chaos is one type of complex dynamic behaviour generated by determined nonlinear dynamic systems.Chaos functions have mainly used to develop mathematical models of non linear systems .Chaotic systems have many important properties, such... more
A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based... more
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
Most of the existing hierarchical secret-sharing schemes are unconditionally (non-cryptographically) secured, and they cannot survive from various types of attacks especially when the participants use resource-constrained wireless mobile... more
Natural and man-made catastrophic events appear be steadily increasing in intensity and frequency. Proper preparation, response and recovery are essential if mankind and its vital systems are to cope with and survive large-scale... more
This article proposes a hybrid certificateless signcryption scheme that is secure against adaptive chosen ciphertext adversary in the random oracle model. The scheme combines an asymmetric encryption which is one way against chosen... more
An Identity-based cryptosystem is a Public Key cryptosystem in which the public keys of the entities are their identities, or strings derived from their identities. Signcryption combines digital signatures and encryption with a cost... more
Mobile communication and Mobile Commerce is most famous nowadays as a result of the administration offered amid the portability. In any case, notwithstanding of its new headways, versatile correspondence has been confronting numerous... more
... Dr Faisal Bashir Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi, Pakistan [email protected] Dr Asif Masood Computer Science Dept College of Telecommunication Engineering (MCS) Rawalpindi,... more
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a mobile network. In this paper, we present the notion of... more
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front IT infrastructure investment costs. It... more