2012
DOI: 10.1007/978-94-007-5860-5_17
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…The scheme provides all the security properties these security properties with a saving in computation cost compared to the traditional signature-then-encryption scheme, which makes the new scheme more appropriate for environments with limited computing power. Suman Bala et.al [20] proposed an elliptic curve signcryption key management scheme for wireless sensor networks which provides forward secrecy. This scheme is intended to solve key management issue in wireless sensor networks.…”
Section: Emohamed and Helkamchouchimentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme provides all the security properties these security properties with a saving in computation cost compared to the traditional signature-then-encryption scheme, which makes the new scheme more appropriate for environments with limited computing power. Suman Bala et.al [20] proposed an elliptic curve signcryption key management scheme for wireless sensor networks which provides forward secrecy. This scheme is intended to solve key management issue in wireless sensor networks.…”
Section: Emohamed and Helkamchouchimentioning
confidence: 99%
“…Suman Bala G. Sharma Anil K.Verma [20] Signcryption Scheme based on ECC for Wireless Sensor Networks An elliptic curve based signcryption key management scheme has been proposed which includes forward secrecy.…”
mentioning
confidence: 99%
“…The verification of the scheme is conceivable only after rupturing the confidentiality to a trusted third party. Bala et al [2] proposed signcryption scheme using elliptic curve cryptography for key management, the scheme provides forward secrecy and other traditional security requirements but it lacks public verifiability.…”
Section: Introductionmentioning
confidence: 99%
“…Zhang [18] was the premier to introduce notion of authenticated encryption (some times termed as signcryption). Till then a lot of authenticated encryption schemes were proposed [19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Motivation and Contributions: Recently Yang et al [33] pointed out that in existing authenticated encryption schemes [19][20][21][22][23][24][25][27][28][29][30][31][32] sender's signature is generated further the signature is verified on receiver side, this generation and verification of sender's signature burdened the system. They also emphasized that the signature transmitted over insecure public network may result into its illegal use.…”
Section: Introductionmentioning
confidence: 99%