Skip to main content
Log in

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important developement is Signcryption to achieve message confidentiality, integrity, sender and message authentication, non repudiation, forward secrecy as well as unforgeability,and public verifiability. Since Signcryption combines the signature and encryption therefore the cost is very less in comparison to those schemes based on the signature then encryption. Many signcryption schemes have been proposed based on El-Gamal, RSA and ECC till today. This paper highlights limitations of the existing ECC based schemes using signcryption. These limitations include some missing security aspects as well as high computation power requirement, more communication overhead incurred and large memory requirements. Further it proposes an efficient lightweight signcryption scheme based on HECC which fulfills all the security requirements. The scheme reduced significant amounts of computation, communication costs and message size as compared to existing signcryption schemes making it the good candidate for environments suffer from the resource limitation problems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178

    Article  Google Scholar 

  2. Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149

  3. Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59

  4. Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142

  5. Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275

    Google Scholar 

  6. Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7–13

  7. Diffie W, Oorschot PCV, Wiener JM (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125

    Article  Google Scholar 

  8. Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag, pp 69–81

  9. Ganesan R, Vivekanandan K (2009) A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE, pp 293–296

  10. Ganesan R, Gobi M, Vivekanandan K (2010) A novel digital envelope approach for a secure e-commerce channel. Int J Netw Secur 11(3):121–127

    Google Scholar 

  11. Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl Math Comput 167(2):870–881

    Article  MATH  MathSciNet  Google Scholar 

  12. Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S (2013) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 7(8):1210–1218

  13. Irshad A, Sher M, Rehman E, Ch SA, Hassan MU, Ghani A (2013) A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools Appl:1–18

  14. Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63

    Article  Google Scholar 

  15. Koblitz N (1989) Hyperelliptic cryptosystems. J Cryptol 1(3):139–150

    Article  MATH  MathSciNet  Google Scholar 

  16. Mehmood Z, Nizamuddin N, Ch S, Nasar W, Ghani A (2012) An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE, pp 164–167

  17. Mohapatra RK (2010) Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D. thesis

  18. Nizamuddin, Ch SA, Amin N (2011) Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: High capacity optical networks and enabling technologies (HONET), 2011, pp 244–247. doi:10.1109/HONET.2011.6149826

  19. Nizamuddin, Ch SA, Nasar W, Javaid Q (2011) Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In: 7th international conference on emerging technologies (ICET), 2011, pp 1–4

  20. Sharma G, Bala S, Verma AK (2013) An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer, 151–157

  21. Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1):181–193. doi:10.1007/s11042-011-0956-1

    Article  Google Scholar 

  22. Toorani M, Beheshti AA (2010) An elliptic curve-based signcryption scheme with forward secrecy. arXiv:1005.1856

  23. Varalakshmi L, Florence SG (2013) An enhanced encryption algorithm for video based on multiple huffman tables. Multimedia Tools Appl 64(3):717–729

    Article  Google Scholar 

  24. You L, Sang YX (2010) Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J China Univ Posts Telecommun 17(2):100–115

    Article  Google Scholar 

  25. Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryptosystem based on chaotic maps. Int J Digit Content Tech Appl 6(13):265–274

  26. Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong HY (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl:1–12

  27. Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer, pp 165–179

  28. Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68(5):227–233

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shehzad Ashraf Ch.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ch, S.A., uddin, N., Sher, M. et al. An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed Tools Appl 74, 1711–1723 (2015). https://doi.org/10.1007/s11042-014-2283-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2283-9

Keywords

Navigation