Abstract
Owing the advantages of Elliptic Curve Cryptography (ECC), we proposed a Certificateless Public Key Cryptosystem (CL-PKC)-based ElGamal Encryption (CL-EE) scheme using ECC in this paper. In literature, ECC-based ElGamal Encryption scheme is devised using Certificate Authority-based Public Key Cryptography (CA-PKC) that needs a global Public Key Infrastructure (PKI) to maintain the public keys and certificates. Moreover, in PKI architecture, the sender must have the additional ability to verify the public key certificate of the receiver. It is known that CL-PKC avoids public key certificate and thus, our CL-EE scheme is more efficient than PKI-based ElGamal Encryption scheme. We simulated our scheme using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and the results demonstrated that the scheme is secure against both active and passive attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
ElGamal, T.: A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans. Info. Theor. 31, 469–472 (1985)
Miller, V.S.: Use of elliptic curves in cryptography. In: Proceeding of the Advances in Cryptology (Crypto’85), pp. 417–426. Springer, Berlin (1985)
Koblitz, N.: Elliptic curve cryptosystem. J. Math. Comp. 48(177), 203–209 (1987)
Stallings, W.: Cryptography and Network Security Principles and Practice, pp. 325–326. Prentice Hall (Pearson), Upper Saddle River (2006)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)
Shamir, A.: Identity based cryptosystems and signature schemes. In: Proceedings of the Crypto’84, LNCS, vol. 196, pp. 47–53. Springer, Berlin (1984)
Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Proceedings of the Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, Berlin (2003)
Islam, S.H., Biswas, G.P.: Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 26(1), 89–97 (2014)
Islam S.H., Biswas G.P.: Certificateless Strong Designated Verifier Multisignature Scheme Using Bilinear Pairings. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI’12), pp. 540–546. (2013)
Islam, S.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 25, 51–61 (2013)
AVISPA Web tool: Automated Validation of Internet Security Protocols and Applications. www.avispa-project.org/web-interface/. Accessed on July 2013
Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Berlin (1991)
Islam, S.H., Biswas, G.P.: An efficient and secure strong designated verifier signature scheme without bilinear pairings. J. Appl. Math. Info. 31(3–4), 425–441 (2013)
Islam, S.H., Biswas, G.P.: A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 26(1), 55–67 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Mishra, M.K., Islam, S.K.H., Biswas, G.P. (2014). Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC. In: Biswas, G., Mukhopadhyay, S. (eds) Recent Advances in Information Technology. Advances in Intelligent Systems and Computing, vol 266. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1856-2_4
Download citation
DOI: https://doi.org/10.1007/978-81-322-1856-2_4
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1855-5
Online ISBN: 978-81-322-1856-2
eBook Packages: EngineeringEngineering (R0)