Multimedia Tools and Applications

, Volume 74, Issue 5, pp 1711–1723 | Cite as

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

  • Shehzad Ashraf ChEmail author
  • Nizam uddin
  • Muhammad Sher
  • Anwar Ghani
  • Husnain Naqvi
  • Azeem Irshad


The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important developement is Signcryption to achieve message confidentiality, integrity, sender and message authentication, non repudiation, forward secrecy as well as unforgeability,and public verifiability. Since Signcryption combines the signature and encryption therefore the cost is very less in comparison to those schemes based on the signature then encryption. Many signcryption schemes have been proposed based on El-Gamal, RSA and ECC till today. This paper highlights limitations of the existing ECC based schemes using signcryption. These limitations include some missing security aspects as well as high computation power requirement, more communication overhead incurred and large memory requirements. Further it proposes an efficient lightweight signcryption scheme based on HECC which fulfills all the security requirements. The scheme reduced significant amounts of computation, communication costs and message size as compared to existing signcryption schemes making it the good candidate for environments suffer from the resource limitation problems.


Hyperelliptic curve cryptosystem Lightweight cryptography ECC HECC Signcryption Public verifiability Authentication Forward secrecy 


  1. 1.
    Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178CrossRefGoogle Scholar
  2. 2.
    Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149Google Scholar
  3. 3.
    Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59Google Scholar
  4. 4.
    Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142Google Scholar
  5. 5.
    Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275Google Scholar
  6. 6.
    Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7–13Google Scholar
  7. 7.
    Diffie W, Oorschot PCV, Wiener JM (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125CrossRefGoogle Scholar
  8. 8.
    Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag, pp 69–81Google Scholar
  9. 9.
    Ganesan R, Vivekanandan K (2009) A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE, pp 293–296Google Scholar
  10. 10.
    Ganesan R, Gobi M, Vivekanandan K (2010) A novel digital envelope approach for a secure e-commerce channel. Int J Netw Secur 11(3):121–127Google Scholar
  11. 11.
    Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl Math Comput 167(2):870–881CrossRefzbMATHMathSciNetGoogle Scholar
  12. 12.
    Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S (2013) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 7(8):1210–1218Google Scholar
  13. 13.
    Irshad A, Sher M, Rehman E, Ch SA, Hassan MU, Ghani A (2013) A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools Appl:1–18Google Scholar
  14. 14.
    Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63CrossRefGoogle Scholar
  15. 15.
    Koblitz N (1989) Hyperelliptic cryptosystems. J Cryptol 1(3):139–150CrossRefzbMATHMathSciNetGoogle Scholar
  16. 16.
    Mehmood Z, Nizamuddin N, Ch S, Nasar W, Ghani A (2012) An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE, pp 164–167Google Scholar
  17. 17.
    Mohapatra RK (2010) Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D. thesisGoogle Scholar
  18. 18.
    Nizamuddin, Ch SA, Amin N (2011) Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: High capacity optical networks and enabling technologies (HONET), 2011, pp 244–247. doi: 10.1109/HONET.2011.6149826
  19. 19.
    Nizamuddin, Ch SA, Nasar W, Javaid Q (2011) Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In: 7th international conference on emerging technologies (ICET), 2011, pp 1–4Google Scholar
  20. 20.
    Sharma G, Bala S, Verma AK (2013) An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer, 151–157Google Scholar
  21. 21.
    Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1):181–193. doi: 10.1007/s11042-011-0956-1 CrossRefGoogle Scholar
  22. 22.
    Toorani M, Beheshti AA (2010) An elliptic curve-based signcryption scheme with forward secrecy. arXiv:1005.1856
  23. 23.
    Varalakshmi L, Florence SG (2013) An enhanced encryption algorithm for video based on multiple huffman tables. Multimedia Tools Appl 64(3):717–729CrossRefGoogle Scholar
  24. 24.
    You L, Sang YX (2010) Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J China Univ Posts Telecommun 17(2):100–115CrossRefGoogle Scholar
  25. 25.
    Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryptosystem based on chaotic maps. Int J Digit Content Tech Appl 6(13):265–274Google Scholar
  26. 26.
    Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong HY (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl:1–12Google Scholar
  27. 27.
    Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer, pp 165–179Google Scholar
  28. 28.
    Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68(5):227–233CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Shehzad Ashraf Ch
    • 1
    Email author
  • Nizam uddin
    • 2
  • Muhammad Sher
    • 1
  • Anwar Ghani
    • 1
  • Husnain Naqvi
    • 1
  • Azeem Irshad
    • 1
  1. 1.International Islamic UniversityIslambadPakistan
  2. 2.Hazara UniversityMansehraPakistan

Personalised recommendations