Skip to main content

Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem

  • Conference paper
Book cover Information Systems, Technology and Management (ICISTM 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 285))

Abstract

Signcryption is a process of combining encryption and signature into a single logical step. Traditional signcryption schemes provide message confidentiality and sender authentication, sender authentication can only be provided after unsigncryption of signcrypted text, so the third part can only verify the sender after breaching the confidentiality. In public verifiable signcryption schemes a third party or judge can verify authenticity of sender without breaching the confidentiality and without knowing the receiver private key, the judge just needs the signcrypted text and some additional parameters. In this paper, we proposed a resource efficient Hyperelliptic curve cryptosystem based signcryption schemes to provide message confidentiality, authentication, integrity, unforgeability, non-repudiation, along with forward secrecy and public verifiability. In case of dispute the judge can verify signcrypted text directly without sender/receiver private parameters. Our schemes are resource efficient and can be applied to any resource constrained environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Paul, C., Menezes, J., Vanstone, A.: Handbook of Applied Cryptography. CRC Press (1996)

    Google Scholar 

  2. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 472–492 (1976)

    Article  MathSciNet  Google Scholar 

  3. Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  4. Zheng, Y., Imai, H.: How to construct signcryption schemes on elliptic curve. Information Processing Letters 68, 227–233 (1998)

    Article  MathSciNet  Google Scholar 

  5. Hwang, R.-J., Lai, C.-H., Su, F.-F.: An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation 167(2), 870–881 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  6. Toorani, M., Beheshti Shirazi, A.A.: An Elliptic Curve-based Signcryption Scheme with Forward Secrecy. Journal of Applied Sciences 9(6), 1025–1035 (2009) ISSN 1812-5654

    Article  Google Scholar 

  7. Mohapatra, R.K., Majhi, B.: Signcryption Schemes with Forward Secrecy Based on Elliptic Curve Cryptography. M Tech Thesis Department of Computer Science and Engineering National Institute of Technology Rourkela Rourke

    Google Scholar 

  8. Koblitz, N.: Hyperelliptic cryptosystems. Journal of Cryptology 1(3), 139–150 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  9. Zhou, X.: Improved Ring Signature Scheme Based on Hyper-Elliptic Curves. In: IEEE International Conference on Future Information Technology and Management Engineering, FITME, pp. 373–376 (2009)

    Google Scholar 

  10. Zhou, X., Yang, X., Wei, P.: Hyper-elliptic curves based group signature. In: Control and Decision Conference, CCDC 2009, Chinese, pp. 2280–2284 (2009)

    Google Scholar 

  11. Zhou, X., Yang, X.: Hyper-Elliptic Curves Cryptosystem Based Blind Signature. In: Pacific-Asia Conference on Knowledge Engineering and Software Engineering, KESE 2009 (2009)

    Google Scholar 

  12. Ganesan, R., Vivekanandan, K.: A Novel Hybrid Security Model for E-Commerce Channel. In: International Conference on Advances in Recent Technologies in Communication and Computing (2009)

    Google Scholar 

  13. Ganesan, R., Vivekanandan, K.: A Secured Hybrid Architecture Model for Internet Banking (e-Banking). Journal of Internet Banking and Commerce 14(1) (April 2009)

    Google Scholar 

  14. Ganesan, R., Gobi, M., Vivekanandan, K.: A Novel Digital Envelope Approach for A Secure E-Commerce Channel. International Journal of Network Security 11(3), 121–127 (2010)

    Google Scholar 

  15. Lin, Y., Yong-Xuan, S.: Effective generalized equations of secure hyperelliptic curve digital signature algorithms. The Journal of China Universities of Posts and Telecommunications 17(2), 100–108 (2010)

    Article  Google Scholar 

  16. Nizamuddin, Ch., S.A., Nasar, W., Javaid, Q.: Efficient Signcryption Schemes based on Hyperelliptic Curve Cryptosystem. In: ICET 2011 (September 2011)

    Google Scholar 

  17. Nizamuddin, Ch., S.A., Amin, N.: Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem. In: HONET 2011 (December 2011)

    Google Scholar 

  18. Chatterjee, K., De, A., Gupta, D.: Software Implementation of Curve based Cryptography for Constrained Devices. International Journal of Computer Applications (0975–8887) 24(5) (2011)

    Google Scholar 

  19. Wang, G., Bao, F., Ma, C., Chen, K.: Efficient authenticated encryption schemes with public verifiability. In: Vehicular Technology Conference, VTC 2004 (2004), doi:10.1109/VETECF.2004.1404665

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ashraf Ch, S., Nizamuddin, Sher, M. (2012). Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. In: Dua, S., Gangopadhyay, A., Thulasiraman, P., Straccia, U., Shepherd, M., Stein, B. (eds) Information Systems, Technology and Management. ICISTM 2012. Communications in Computer and Information Science, vol 285. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29166-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29166-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29165-4

  • Online ISBN: 978-3-642-29166-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics