Skip to main content

Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC

  • Conference paper
  • First Online:
  • 1117 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 266))

Abstract

Owing the advantages of Elliptic Curve Cryptography (ECC), we proposed a Certificateless Public Key Cryptosystem (CL-PKC)-based ElGamal Encryption (CL-EE) scheme using ECC in this paper. In literature, ECC-based ElGamal Encryption scheme is devised using Certificate Authority-based Public Key Cryptography (CA-PKC) that needs a global Public Key Infrastructure (PKI) to maintain the public keys and certificates. Moreover, in PKI architecture, the sender must have the additional ability to verify the public key certificate of the receiver. It is known that CL-PKC avoids public key certificate and thus, our CL-EE scheme is more efficient than PKI-based ElGamal Encryption scheme. We simulated our scheme using AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and the results demonstrated that the scheme is secure against both active and passive attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. ElGamal, T.: A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans. Info. Theor. 31, 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  2. Miller, V.S.: Use of elliptic curves in cryptography. In: Proceeding of the Advances in Cryptology (Crypto’85), pp. 417–426. Springer, Berlin (1985)

    Google Scholar 

  3. Koblitz, N.: Elliptic curve cryptosystem. J. Math. Comp. 48(177), 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  4. Stallings, W.: Cryptography and Network Security Principles and Practice, pp. 325–326. Prentice Hall (Pearson), Upper Saddle River (2006)

    Google Scholar 

  5. Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)

    MATH  Google Scholar 

  6. Shamir, A.: Identity based cryptosystems and signature schemes. In: Proceedings of the Crypto’84, LNCS, vol. 196, pp. 47–53. Springer, Berlin (1984)

    Google Scholar 

  7. Al-Riyami, S., Paterson, K.: Certificateless public key cryptography. In: Proceedings of the Asiacrypt’03, LNCS, vol. 2894, pp. 452–473. Springer, Berlin (2003)

    Google Scholar 

  8. Islam, S.H., Biswas, G.P.: Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 26(1), 89–97 (2014)

    Google Scholar 

  9. Islam S.H., Biswas G.P.: Certificateless Strong Designated Verifier Multisignature Scheme Using Bilinear Pairings. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI’12), pp. 540–546. (2013)

    Google Scholar 

  10. Islam, S.H., Biswas, G.P.: Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 25, 51–61 (2013)

    Google Scholar 

  11. AVISPA Web tool: Automated Validation of Internet Security Protocols and Applications. www.avispa-project.org/web-interface/. Accessed on July 2013

  12. Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Berlin (1991)

    Google Scholar 

  13. Islam, S.H., Biswas, G.P.: An efficient and secure strong designated verifier signature scheme without bilinear pairings. J. Appl. Math. Info. 31(3–4), 425–441 (2013)

    Article  Google Scholar 

  14. Islam, S.H., Biswas, G.P.: A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univ.-Comput. Inf. Sci. 26(1), 55–67 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj K. Mishra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Mishra, M.K., Islam, S.K.H., Biswas, G.P. (2014). Design of ECC-Based ElGamal Encryption Scheme Using CL-PKC. In: Biswas, G., Mukhopadhyay, S. (eds) Recent Advances in Information Technology. Advances in Intelligent Systems and Computing, vol 266. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1856-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1856-2_4

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1855-5

  • Online ISBN: 978-81-322-1856-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics