메뉴 건너뛰기




Volumn 74, Issue 5, 2015, Pages 1711-1723

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

Author keywords

Authentication; ECC; Forward secrecy; HECC; Hyperelliptic curve cryptosystem; Lightweight cryptography; Public verifiability; Signcryption

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84925507784     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-014-2283-9     Document Type: Article
Times cited : (46)

References (28)
  • 1
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
    • (2013) Multimed Tools Appl , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 2
    • 84874148363 scopus 로고    scopus 로고
    • An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer
    • Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149
    • (2013) pp 141–149
    • Bala, S.1    Sharma, G.2    Verma, A.K.3
  • 3
    • 84958948780 scopus 로고    scopus 로고
    • A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer
    • Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59
    • (1998) pp 55–59
    • Bao, F.1    Deng, R.H.2
  • 4
    • 84861166810 scopus 로고    scopus 로고
    • Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg
    • Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142
    • (2012) pp 135–142
    • Ch, S.A.1    uddin, N.2    Sher, M.3
  • 5
    • 84925493265 scopus 로고    scopus 로고
    • A hybrid encryption technique for digital holography using DCT and DWT
    • Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275
    • (2011) J Inf Commun Converg Eng , vol.9 , Issue.3 , pp. 271-275
    • Choi, H.J.1    Seo, Y.H.2    Kim, D.W.3
  • 6
    • 84906780265 scopus 로고    scopus 로고
    • Extended key management scheme for dynamic group in multi-cast communication
    • Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7–13
    • (2013) J Converg , vol.4 , Issue.4 , pp. 7-13
    • Degefa, F.B.1    Won, D.2
  • 7
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Diffie W, Oorschot PCV, Wiener JM (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125
    • (1992) Des Codes Crypt , vol.2 , pp. 107-125
    • Diffie, W.1
  • 8
    • 35048817852 scopus 로고    scopus 로고
    • Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag
    • Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag, pp 69–81
    • (1999) pp 69–81
    • Gamage, C.1    Leiwo, J.2    Zheng, Y.3
  • 9
    • 73849126237 scopus 로고    scopus 로고
    • A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE
    • Ganesan R, Vivekanandan K (2009) A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE, pp 293–296
    • (2009) pp 293–296
    • Ganesan, R.1    Vivekanandan, K.2
  • 10
    • 80052853191 scopus 로고    scopus 로고
    • A novel digital envelope approach for a secure e-commerce channel
    • Ganesan R, Gobi M, Vivekanandan K (2010) A novel digital envelope approach for a secure e-commerce channel. Int J Netw Secur 11(3):121–127
    • (2010) Int J Netw Secur , vol.11 , Issue.3 , pp. 121-127
    • Ganesan, R.1    Gobi, M.2    Vivekanandan, K.3
  • 11
    • 25144467465 scopus 로고    scopus 로고
    • An efficient signcryption scheme with forward secrecy based on elliptic curve
    • Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl Math Comput 167(2):870–881
    • (2005) Appl Math Comput , vol.167 , Issue.2 , pp. 870-881
    • Hwang, R.J.1    Lai, C.H.2    Su, F.F.3
  • 12
    • 84904860928 scopus 로고    scopus 로고
    • A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
    • Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S (2013) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 7(8):1210–1218
    • (2013) Security and Communication Networks , vol.7 , Issue.8 , pp. 1210-1218
    • Irshad, A.1    Sher, M.2    Faisal, M.S.3    Ghani, A.4    Ul Hassan, M.5    Ashraf Ch, S.6
  • 13
    • 84929841169 scopus 로고    scopus 로고
    • A single round-trip sip authentication scheme for voice over internet protocol using smart card
    • Irshad A, Sher M, Rehman E, Ch SA, Hassan MU, Ghani A (2013) A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools Appl:1–18
    • (2013) Multimedia Tools Appl , pp. 1-18
    • Irshad, A.1    Sher, M.2    Rehman, E.3    Ch, S.A.4    Hassan, M.U.5    Ghani, A.6
  • 14
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
    • (2001) Int J Inf Secur , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 15
    • 0024864204 scopus 로고
    • Hyperelliptic cryptosystems
    • Koblitz N (1989) Hyperelliptic cryptosystems. J Cryptol 1(3):139–150
    • (1989) J Cryptol , vol.1 , Issue.3 , pp. 139-150
    • Koblitz, N.1
  • 16
    • 84866660545 scopus 로고    scopus 로고
    • An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE
    • Mehmood Z, Nizamuddin N, Ch S, Nasar W, Ghani A (2012) An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE, pp 164–167
    • (2012) pp 164–167
    • Mehmood, Z.1    Nizamuddin, N.2    Ch, S.3    Nasar, W.4    Ghani, A.5
  • 17
    • 84925516389 scopus 로고    scopus 로고
    • Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D
    • Mohapatra RK (2010) Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D. thesis
    • (2010) thesis
    • Mohapatra, R.K.1
  • 18
    • 84857485578 scopus 로고    scopus 로고
    • Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem
    • Nizamuddin, Ch SA, Amin N (2011) Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: High capacity optical networks and enabling technologies (HONET), 2011, pp 244–247. doi:10.1109/HONET.2011.6149826
    • (2011) High capacity optical networks and enabling technologies (HONET) , vol.2011 , pp. 244-247
    • Nizamuddin, C.S.A.1    Amin, N.2
  • 20
    • 84874179353 scopus 로고    scopus 로고
    • An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer
    • Sharma G, Bala S, Verma AK (2013) An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer, 151–157
    • (2013) 151–157
    • Sharma, G.1    Bala, S.2    Verma, A.K.3
  • 21
    • 84874930356 scopus 로고    scopus 로고
    • Voip encryption module for securing privacy
    • Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1):181–193. doi:10.1007/s11042-011-0956-1
    • (2013) Multimedia Tools Appl , vol.63 , Issue.1 , pp. 181-193
    • Son, B.1    Nahm, E.2    Kim, H.3
  • 23
    • 84888645672 scopus 로고    scopus 로고
    • An enhanced encryption algorithm for video based on multiple huffman tables
    • Varalakshmi L, Florence SG (2013) An enhanced encryption algorithm for video based on multiple huffman tables. Multimedia Tools Appl 64(3):717–729
    • (2013) Multimedia Tools Appl , vol.64 , Issue.3 , pp. 717-729
    • Varalakshmi, L.1    Florence, S.G.2
  • 24
    • 77955606987 scopus 로고    scopus 로고
    • Effective generalized equations of secure hyperelliptic curve digital signature algorithms
    • You L, Sang YX (2010) Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J China Univ Posts Telecommun 17(2):100–115
    • (2010) J China Univ Posts Telecommun , vol.17 , Issue.2 , pp. 100-115
    • You, L.1    Sang, Y.X.2
  • 26
    • 85018102575 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    • Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong HY (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl:1–12
    • (2014) Multimedia Tools Appl , pp. 1-12
    • Zhang, Z.1    Qi, Q.2    Kumar, N.3    Chilamkurti, N.4    Jeong, H.Y.5
  • 27
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer
    • Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer, pp 165–179
    • (1997) pp 165–179
    • Zheng, Y.1
  • 28
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68(5):227–233
    • (1998) Inf Process Lett , vol.68 , Issue.5 , pp. 227-233
    • Zheng, Y.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.