logo
    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme
    3
    Citation
    18
    Reference
    10
    Related Paper
    Citation Trend
    Keywords:
    Signcryption
    Group signature
    Communication source
    Signature (topology)
    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. The purpose of the study is to combine the public key encryption with Schnorr digital signature in order to obtain less computational and communicational costs. Signcryption primitive is a better approach then Encrypt-then-Sign or Sign-then-Encrypt methods regarding the costs. All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.
    Signcryption
    ElGamal encryption
    Signature (topology)
    Schnorr signature
    Digital Signature Algorithm
    Citations (5)
    Communication source
    Signature (topology)
    Electronic signature
    This article expounds basic information related to digital signature and digital signcryption.Based on the integrated analysis on various existing digital signature programs and signcryption programs,and utilizing the difficulty of oval curve discrete logarithmic problem,this paper proposes the improved digital signcryption algorithm on the basis of aeoplotropism ellipitc curve so as to meet the optimized target of reducing seeking inverse operation in the process of signcryption proof procedure.Aeoplotropism means only the specipient can make the signcryption.Experiments show that this improved algorithm has a significant effect of accelerating operation.
    Signcryption
    Digital Signature Algorithm
    Signature (topology)
    Citations (0)
    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.
    Signcryption
    Signature (topology)
    Schnorr signature
    Proxy (statistics)
    ElGamal signature scheme
    Merkle signature scheme
    Digital Signature Algorithm
    Citations (1)
    The digital signature scheme is one technology for proving that the signer of a digital document is genuine and guaranteeing the integrity of the digital document. A scheme using the digital signature of a Trusted Third Party (TTP) was standardized in ISO/IEC 15945 [1], but cannot specify whether the malicious entity is the sender or receiver when dishonest actions occur between the sender and receiver. An electronic notary system by the New Media Development Association and nonrepudiation mechanisms standardized in ISO/IEC 13888 were proposed as methods via a TTP to solve this problem. The processing load is critical when using TTP. However, these schemes do not take the processing load on the TTP into account and are therefore impractical in terms of processing performance. Hence, we propose a digital document protection scheme capable of specifying dishonest actions by either the sender or receiver, reducing the processing load on the TTP, and verifying the digital signature only when a problem has occurred. We further show that our proposed scheme is valid for digital documents such as electronic contracts of a few megabytes in size by comparing it with the above two schemes in terms of TTP transaction time. We also evaluate the data sizes retained by the TTP in our proposed scheme. © 2005 Wiley Periodicals, Inc. Electron Comm Jpn Pt 3, 88(8): 18–27, 2005; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ecjc.20144
    Communication source
    Signature (topology)
    Digital Signature Algorithm
    Trusted third party
    Citations (1)
    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.
    Signcryption
    ElGamal encryption
    Signature (topology)
    ElGamal signature scheme
    Digital Signature Algorithm
    Schnorr signature
    Citations (1)
    The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extentions for the signcryption scheme and discusses the security in signcryption.
    Signcryption
    Signature (topology)
    Citations (0)
    Signcryption is a new cryptographic technology, which simultaneously fulfills both the function of digital and public key in a logically single step, and more efficient than the traditional signature followed by encryption approach. In this paper we propose a mutli-signcryption model based on multi-signature and signcryption, and various signatures and encryptions can be chosen flexibly in the model. At the same time, the model can be instantiated into the multi-signcryption scheme to a single or a group message and the multi-signcryption scheme which can only be decrypted by multi-receivers.
    Signcryption
    Signature (topology)
    Citations (1)
    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life. The purpose of the study is to combine the public key encryption with Schnor digital signature in order to obtain less computational and communicational costs. Signcryption primitive is a better approach then Encrypt-then-Sign or Sign- then-Encrypt methods regarding the costs. All these algorithms offer the possibility to transmit a message over an insecure channel providing both authenticity and confidentiality.
    Signcryption
    ElGamal encryption
    Signature (topology)
    Digital Signature Algorithm
    ElGamal signature scheme
    Schnorr signature
    Citations (1)
    Signcryption combines digital signature and encryption,but the research about the efficient Identity based signcryption schemes is difficult.For this,an efficient ID-based signcryption scheme which uses bilinear pairings is proposed.In the scheme,identity message is imported into signature key,and signature contains message.As the scheme can separate the signature verification from message recovery,it can be applied in mobile E-business scenario,such as filtration of bad instant messages of mobile equipment.
    Signcryption
    Signature (topology)
    Citations (0)