2014
DOI: 10.1007/s11042-014-2283-9
|View full text |Cite
|
Sign up to set email alerts
|

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

Abstract: The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important developement is Signcryption to achieve message confidentiality, integrity, sender and message authentication, non repudiation, forward secrecy as well as unforgeability,and public verifiability. Since Sig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(25 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…Further, a vehicle should register using services provided by RS before it joins the session or after it departs from session. The forward secrecy and backward secrecy properties are implied and defined in Ch et al 35 Authenticated vehicle. The RS needs to guarantee that its use of LBS services is only for its subscribers.…”
Section: Trust Management System Requirementsmentioning
confidence: 99%
“…Further, a vehicle should register using services provided by RS before it joins the session or after it departs from session. The forward secrecy and backward secrecy properties are implied and defined in Ch et al 35 Authenticated vehicle. The RS needs to guarantee that its use of LBS services is only for its subscribers.…”
Section: Trust Management System Requirementsmentioning
confidence: 99%
“…Moreover, they analyzed the security of their protocol in terms of authenticity, unforgeability, confidentiality, nonrepudiation and forward secrecy. As mentioned previously, the signcryption protocols (Zheng, 1997;Zheng and Imai, 1998;Deng and Bao, 1998;Jung et al, 2001;Han et al, 2004;Hwang et al, 2005b;Yuan and Hung, 2008;Toorani and Beheshti, 2009;Mohapatra, 2010;Ashraf et al, 2015;Nasreldin et al, 2015b;Singh 2016) are based on ECC that will be described in details in the next subsection.…”
Section: Digital Forensics In Cloud Computingmentioning
confidence: 99%
“…Upon reception of encrypted message and signature tuple, the recipient generate same key and decrypts the message. Finally the recipient verifies the signatures [27][28][29][30][31].…”
Section: Authenticated Encryptionmentioning
confidence: 99%