Abstract
Signcryption is a process of combining encryption and signature into a single logical step. Traditional signcryption schemes provide message confidentiality and sender authentication, sender authentication can only be provided after unsigncryption of signcrypted text, so the third part can only verify the sender after breaching the confidentiality. In public verifiable signcryption schemes a third party or judge can verify authenticity of sender without breaching the confidentiality and without knowing the receiver private key, the judge just needs the signcrypted text and some additional parameters. In this paper, we proposed a resource efficient Hyperelliptic curve cryptosystem based signcryption schemes to provide message confidentiality, authentication, integrity, unforgeability, non-repudiation, along with forward secrecy and public verifiability. In case of dispute the judge can verify signcrypted text directly without sender/receiver private parameters. Our schemes are resource efficient and can be applied to any resource constrained environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Paul, C., Menezes, J., Vanstone, A.: Handbook of Applied Cryptography. CRC Press (1996)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 472–492 (1976)
Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Zheng, Y., Imai, H.: How to construct signcryption schemes on elliptic curve. Information Processing Letters 68, 227–233 (1998)
Hwang, R.-J., Lai, C.-H., Su, F.-F.: An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation 167(2), 870–881 (2005)
Toorani, M., Beheshti Shirazi, A.A.: An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. Journal of Applied Sciences 9(6), 1025–1035 (2009) ISSN 1812-5654
Mohapatra, R.K., Majhi, B.: Signcryption Schemes with Forward Secrecy Based on Elliptic Curve Cryptography. M Tech Thesis Department of Computer Science and Engineering National Institute of Technology Rourkela Rourke
Koblitz, N.: Hyperelliptic cryptosystems. Journal of Cryptology 1(3), 139–150 (1989)
Zhou, X.: Improved Ring Signature Scheme Based on Hyper-Elliptic Curves. In: IEEE International Conference on Future Information Technology and Management Engineering, FITME, pp. 373–376 (2009)
Zhou, X., Yang, X., Wei, P.: Hyper-elliptic curves based group signature. In: Control and Decision Conference, CCDC 2009, Chinese, pp. 2280–2284 (2009)
Zhou, X., Yang, X.: Hyper-Elliptic Curves Cryptosystem Based Blind Signature. In: Pacific-Asia Conference on Knowledge Engineering and Software Engineering, KESE 2009 (2009)
Ganesan, R., Vivekanandan, K.: A Novel Hybrid Security Model for E-Commerce Channel. In: International Conference on Advances in Recent Technologies in Communication and Computing (2009)
Ganesan, R., Vivekanandan, K.: A Secured Hybrid Architecture Model for Internet Banking (e-Banking). Journal of Internet Banking and Commerce 14(1) (April 2009)
Ganesan, R., Gobi, M., Vivekanandan, K.: A Novel Digital Envelope Approach for A Secure E-Commerce Channel. International Journal of Network Security 11(3), 121–127 (2010)
Lin, Y., Yong-Xuan, S.: Effective generalized equations of secure hyperelliptic curve digital signature algorithms. The Journal of China Universities of Posts and Telecommunications 17(2), 100–108 (2010)
Nizamuddin, Ch., S.A., Nasar, W., Javaid, Q.: Efficient Signcryption Schemes based on Hyperelliptic Curve Cryptosystem. In: ICET 2011 (September 2011)
Nizamuddin, Ch., S.A., Amin, N.: Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem. In: HONET 2011 (December 2011)
Chatterjee, K., De, A., Gupta, D.: Software Implementation of Curve based Cryptography for Constrained Devices. International Journal of Computer Applications (0975–8887) 24(5) (2011)
Wang, G., Bao, F., Ma, C., Chen, K.: Efficient authenticated encryption schemes with public verifiability. In: Vehicular Technology Conference, VTC 2004 (2004), doi:10.1109/VETECF.2004.1404665
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ashraf Ch, S., Nizamuddin, Sher, M. (2012). Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. In: Dua, S., Gangopadhyay, A., Thulasiraman, P., Straccia, U., Shepherd, M., Stein, B. (eds) Information Systems, Technology and Management. ICISTM 2012. Communications in Computer and Information Science, vol 285. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29166-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-29166-1_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29165-4
Online ISBN: 978-3-642-29166-1
eBook Packages: Computer ScienceComputer Science (R0)