Skip to main content

An Improved Encryption and Signature Verification ECC Scheme for Cloud Computing

  • Conference paper
  • First Online:
Proceedings of the International Conference on Signal, Networks, Computing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 396))

Abstract

Ensuring the security and efficient authentication of any information is a prime concern for a cryptographic technique. In cloud model, since data is outsourced over untrusted third party without any physical possession of that, increase the concern regarding the cloud data security. Public key cryptography technique in cloud system is useful only if there is proper authentication of transformation of public key to authenticated user only. On the other hand, ECC technique compared to this provides different ways of ECC cryptographic key management, encryption, decryption, and digital signature and its verification. The advantage of ECC over public key scheme is that, it provides the same security level for a smaller key size compared to public key scheme, thus, reducing the process time of any cryptographic operation over the data in its communication between different cloud communicating parties. In this paper, we present a new framework for cloud system which has a different way of encryption/ decryption using ECC over finite field and improve signature and verification scheme. The result shows that communication cost is less compared to other scheme and improved speedup for signature and verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT-22, (1976), pp. 644–654.

    Google Scholar 

  2. R. Rivest, A. Shamir and L. Adeleman, A method for obtaining digital signatures and public key cryptosystems, Communication of the ACM, Vol. no 21, (1978), pp. 120–126.

    Google Scholar 

  3. T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transaction on Information Theory, IT-31(4), 1985, pp. 469–472.

    Google Scholar 

  4. N. Koblizt, Elliptic curve cryptosystem, Mathematics of Computation 48(177), 1987, pp. 203–209.

    Google Scholar 

  5. V. S. Miller, Use of elliptic curves in cryptography, Advances in Cryptology-Proceedings of Crypto’85, LNCS, vol. 218, Springer, 1986, pp. 417–426.

    Google Scholar 

  6. Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).

    Google Scholar 

  7. Shahril, Eddie, and Wan Daud Wan Suhana. “ID-Based signature scheme using elliptic curve cryptosystem.” (2013).

    Google Scholar 

  8. Y. F. Chung, K. H. Huang, F. Lai, T. S. Chen, ID-based digital signature scheme on the elliptic curve cryptosystem, Computer Standards and Interfaces 29, 2007, pp. 601–604.

    Google Scholar 

  9. Abid, Ounasser, Jaouad Ettanfouhi, and Omar Khadir. “New digital signature protocol based on elliptic curves.” arXiv preprint arXiv:1301.2335 (2013).

  10. N. Koblizt, A. Menezes, S. Vanstone, The state of elliptic curve cryptography, Design, Codes and Cryptography 19, 2000, pp. 173–193.

    Google Scholar 

  11. Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, “Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields”, International Journal of Computer Applications, Vol. 36, No. 1 November 2011.

    Google Scholar 

  12. Kin Choong Yow and Amol Dabholkar, A Light-Weight mutual authentication and key-exchange protocol based of elliptical curve cryptography for energy-constrained devices, International Journal of Network Security & its Applications Vol. 2 No. 2 April 2010.

    Google Scholar 

  13. Mohsen Machhout eat.al., coupled FPGA/ASIC implementation of elliptic curve crypto-processor, International Journal of Network Security & its Applications Vol. 2 No. 2 April 2010.

    Google Scholar 

  14. K. R. Chandrasekhara Pillai and M P Sebastian, “Elliptic Curve based authenticated session Key establishment protocol for High Security Applications in Constrained Network environment” International Journal of Network Security & its Applications (IJNSA), Vol. 2, No. 3, July 2010.

    Google Scholar 

  15. Kumar, D. Sravana, C. H. Suneetha, and A. Chandrasekhar. “Encryption of data using Elliptic Curve over finite fields.” arXiv preprint arXiv:1202.1895 (2012).

  16. Zhao, Gansen, et al. “Trusted data sharing over untrusted cloud storage providers.” Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on. IEEE, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shweta Kaushik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Kaushik, S., Gandhi, C. (2016). An Improved Encryption and Signature Verification ECC Scheme for Cloud Computing. In: Lobiyal, D., Mohapatra, D., Nagar, A., Sahoo, M. (eds) Proceedings of the International Conference on Signal, Networks, Computing, and Systems. Lecture Notes in Electrical Engineering, vol 396. Springer, New Delhi. https://doi.org/10.1007/978-81-322-3589-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-3589-7_5

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-3587-3

  • Online ISBN: 978-81-322-3589-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics