A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach
Insaf Ullah,
Noor Ul Amin,
Junaid Khan,
Muhammad Rehan,
Muhammad Naeem,
Hizbullah Khattak,
Shah Jahan Khattak and
Haseen Ali
Additional contact information
Insaf Ullah: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Noor Ul Amin: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Junaid Khan: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Muhammad Rehan: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Muhammad Naeem: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Hizbullah Khattak: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Shah Jahan Khattak: Pakistan Engineering Council (PEC), Attatruk Avenue (East) Sector G-5/2, Islamabad 44000, Pakistan
Haseen Ali: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Mathematics, 2019, vol. 7, issue 8, 1-16
Abstract:
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public keys, and certificates. Hyper-elliptic curve has lower parameter size, public key size, and certificate size. The aim of the proposed work is to reduce the computational cost and communication cost. Furthermore, we validate the security properties of our proposed scheme by using the well-known simulation tool called automated validation of Internet security protocols and applications. Our approach ensures security properties such as resistance against replay attack, confidentiality, authenticity, unforgeability, integrity, non-repudiation, public verifiability, and forward secrecy.
Keywords: signcryption; security properties of signcryption; hyper-elliptic curve; AVISPA (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/7/8/686/pdf (application/pdf)
https://www.mdpi.com/2227-7390/7/8/686/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:7:y:2019:i:8:p:686-:d:253546
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().