Reference Hub2
An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System

An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System

V. Vinoth Kumar, V. Muthukumaran, N. Ashwini, I.S. Beschi, K. Gunasekaran, V.R. Niveditha
Copyright: © 2022 |Volume: 18 |Issue: 1 |Pages: 31
ISSN: 1548-3673|EISSN: 1548-3681|EISBN13: 9781799893868|DOI: 10.4018/IJeC.299011
Cite Article Cite Article

MLA

Kumar, V. Vinoth, et al. "An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System." IJEC vol.18, no.1 2022: pp.1-31. http://doi.org/10.4018/IJeC.299011

APA

Kumar, V. V., Muthukumaran, V., Ashwini, N., Beschi, I., Gunasekaran, K., & Niveditha, V. (2022). An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System. International Journal of e-Collaboration (IJeC), 18(1), 1-31. http://doi.org/10.4018/IJeC.299011

Chicago

Kumar, V. Vinoth, et al. "An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System," International Journal of e-Collaboration (IJeC) 18, no.1: 1-31. http://doi.org/10.4018/IJeC.299011

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Signcryption is a cryptographic primitive which combines both the functions of digital signature and public key encryption logically in a single step, with a computational cost significantly less than the traditional signature-then-encryption approach. Signcryption is another approach to accomplish secrecy and validation simultaneously across Internet of Things (IoT). Numerous signcryption schemes have been created and executed , but it uses different security attributes and computational cost. In this paper, introducing a new signcryption scheme whose security relies on the intractability of combination of the Twisted Root Extraction Problem (TREP) and Conjugacy Search Problem (CSP) which can utilised for IoT based system for secure transferring of data. It is applied over an IoT to upgrade the security of information and its confidentiality. Experiment shows that modified signcryption algorithm outperforms than existing approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.