2014
DOI: 10.5120/17821-8769
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Elliptic Curve based Signcryption Schemes

Abstract: Signcryption is a new cryptographic approach which provides authentication and encryption simultaneously in a single logical step. The aim is to reduce the cost of signature-thenencryption approach. This cost includes computational cost and communication cost. Furthermore some signcryption schemes are based on RSA while some are based on elliptic curve. This paper provides a critical review of the signcryption schemes based on elliptic curves, since signcryption schemes based on elliptic curve cryptography sav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…In I997, Zheng developed an algorithm that performs the functionalities of both encryption and signatures together in a single process and termed it as signcryption [25]. The revolutionary algorithm saves up to 50% computational cost and 85% bandwidth cost in comparison to previously proposed signthen-encrypt or encrypt-then-sign techniques [26]. The working of the algorithm is based on the idea of a public-key cryptosystem (PKC) [27].…”
Section: Related Workmentioning
confidence: 99%
“…In I997, Zheng developed an algorithm that performs the functionalities of both encryption and signatures together in a single process and termed it as signcryption [25]. The revolutionary algorithm saves up to 50% computational cost and 85% bandwidth cost in comparison to previously proposed signthen-encrypt or encrypt-then-sign techniques [26]. The working of the algorithm is based on the idea of a public-key cryptosystem (PKC) [27].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, many pairing free signcryption schemes based on elliptic curve cryptography (ECC) without the specific condition of ID based authentication can also be found in literature, see survey [16]. In these schemes, the guarantee that a given public key belongs to a certain user is explicitly assumed, for instance by a third party who is checking the integrity of the stored public key and identity data.…”
Section: Related Workmentioning
confidence: 99%
“…As a consequence, the proposed schemes represent the most efficient anonymous signcryption schemes. In order to do a fair comparison with the most efficient one in the state of the art, ASEC [16], we consider the certificate based schemes using the ECQV implicit certificates with the assumption that the public keys are generated offline. Note that in ASEC also the assumption has been made that the validity of the public key is obtained offline, by the storage in a third party protected environment.…”
Section: Anonymous Signcryptionmentioning
confidence: 99%