Digital Signcryption by. Clayton D. Smith. A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of. Master of. In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption. Encryption and digital. Download Citation on ResearchGate | Digital Signcryption or How to The current standard method to hieve this aim is “(digital) signature.
|Published (Last):||22 March 2017|
|PDF File Size:||8.74 Mb|
|ePub File Size:||2.72 Mb|
|Price:||Free* [*Free Regsitration Required]|
The first signcryption scheme was introduced by Yuliang Zheng in Showing of 23 references. This means that at least some aspect of its efficiency for example the computation time is better than any hybrid of digital signature and encryption schemes, under a particular model of security. Topics Discussed in This Paper. sivncryption
Semantic Scholar estimates that this publication has 1, citations based on the available data. Gen generates a pair of keys for any user, SC is generally a probabilistic algorithm, and USC is most likely deterministic.
Signcryption – Wikipedia
Imai, “How to construct efficient signcryption schemes on elliptic curves”Information Processing Letters, Vol. Showing of extracted citations. Untilthey were viewed as important but distinct building blocks of various cryptographic systems. Signcryption provides the properties of sigmcryption digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately.
Low efficiency and high cost of such summation, and the case that any arbitrary scheme cannot guarantee security. This page was last edited on 26 Januaryat From This Paper Figures, tables, and topics from this paper. References Publications referenced by this paper. Note that sometimes hybrid encryption can be employed instead of simple encryption, and a single session-key reused for several encryptions to achieve better overall efficiency across many signature-encryptions than a signcryption scheme but the session-key reuse causes the system to lose security under even the relatively weak CPA model.
Encryption and digital signature are two fundamental cryptographic tools that can guarantee the confidentialityintegrityand non-repudiation. Retrieved from ” https: Languages Deutsch Edit links.
Public-key cryptography Authentication Discrete logarithm Cryptographic primitive. The future of integer factorization. Citations Publications citing this paper. Signcryption is a relatively new cryptographic technique that is digitak to perform the functions signcryptiln digital signature and encryption in a single logical step and can effectively decrease the computational costs and communication overheads in comparison with the traditional signature-then-encryption schemes.
Skip to search form Skip to main content. See our FAQ for additional information. Signcryption Encryption Digital signature Digital data.
A signcryption scheme typically consists of three algorithms: Elliptic Curve Cryptosystems Neal Koblitz FranklinJacques PatarinMichael K. Signcryption Search for additional papers on this topic. This paper has highly influenced other papers.
Views Read Edit View history. In cryptographysigncryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption. Communications security Time complexity Computation High-level programming language.