Abstract
The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important developement is Signcryption to achieve message confidentiality, integrity, sender and message authentication, non repudiation, forward secrecy as well as unforgeability,and public verifiability. Since Signcryption combines the signature and encryption therefore the cost is very less in comparison to those schemes based on the signature then encryption. Many signcryption schemes have been proposed based on El-Gamal, RSA and ECC till today. This paper highlights limitations of the existing ECC based schemes using signcryption. These limitations include some missing security aspects as well as high computation power requirement, more communication overhead incurred and large memory requirements. Further it proposes an efficient lightweight signcryption scheme based on HECC which fulfills all the security requirements. The scheme reduced significant amounts of computation, communication costs and message size as compared to existing signcryption schemes making it the good candidate for environments suffer from the resource limitation problems.
Similar content being viewed by others
References
Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149
Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59
Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142
Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275
Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7–13
Diffie W, Oorschot PCV, Wiener JM (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125
Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag, pp 69–81
Ganesan R, Vivekanandan K (2009) A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE, pp 293–296
Ganesan R, Gobi M, Vivekanandan K (2010) A novel digital envelope approach for a secure e-commerce channel. Int J Netw Secur 11(3):121–127
Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl Math Comput 167(2):870–881
Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S (2013) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 7(8):1210–1218
Irshad A, Sher M, Rehman E, Ch SA, Hassan MU, Ghani A (2013) A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools Appl:1–18
Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
Koblitz N (1989) Hyperelliptic cryptosystems. J Cryptol 1(3):139–150
Mehmood Z, Nizamuddin N, Ch S, Nasar W, Ghani A (2012) An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE, pp 164–167
Mohapatra RK (2010) Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D. thesis
Nizamuddin, Ch SA, Amin N (2011) Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: High capacity optical networks and enabling technologies (HONET), 2011, pp 244–247. doi:10.1109/HONET.2011.6149826
Nizamuddin, Ch SA, Nasar W, Javaid Q (2011) Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In: 7th international conference on emerging technologies (ICET), 2011, pp 1–4
Sharma G, Bala S, Verma AK (2013) An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer, 151–157
Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1):181–193. doi:10.1007/s11042-011-0956-1
Toorani M, Beheshti AA (2010) An elliptic curve-based signcryption scheme with forward secrecy. arXiv:1005.1856
Varalakshmi L, Florence SG (2013) An enhanced encryption algorithm for video based on multiple huffman tables. Multimedia Tools Appl 64(3):717–729
You L, Sang YX (2010) Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J China Univ Posts Telecommun 17(2):100–115
Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryptosystem based on chaotic maps. Int J Digit Content Tech Appl 6(13):265–274
Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong HY (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl:1–12
Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer, pp 165–179
Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68(5):227–233
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ch, S.A., uddin, N., Sher, M. et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed Tools Appl 74, 1711–1723 (2015). https://doi.org/10.1007/s11042-014-2283-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2283-9