Security

A Signcryption Scheme Based on Elliptic Curve Cryptography

Free registration required

Executive Summary

In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logical step called Signcryption. In this paper a Signcryption scheme is suggested which is based on Elliptic Curve Cryptography (ECC). The scheme provides additional security features which include the property of forward secrecy, public verifiability and counter steps for resistance to Side Channel Attacks (SCAs) are also taken.

  • Format: PDF
  • Size: 131 KB