EconPapers    
Economics at your fingertips  
 

A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach

Insaf Ullah, Noor Ul Amin, Junaid Khan, Muhammad Rehan, Muhammad Naeem, Hizbullah Khattak, Shah Jahan Khattak and Haseen Ali
Additional contact information
Insaf Ullah: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Noor Ul Amin: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Junaid Khan: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Muhammad Rehan: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Muhammad Naeem: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan
Hizbullah Khattak: Information Technology Department, Hazra University, Mansehra 21120, Pakistan
Shah Jahan Khattak: Pakistan Engineering Council (PEC), Attatruk Avenue (East) Sector G-5/2, Islamabad 44000, Pakistan
Haseen Ali: Departement of Information Technology, Abbotabad University of Science and Technology, Khyber Pakhtunkhwa 22010, Pakistan

Mathematics, 2019, vol. 7, issue 8, 1-16

Abstract: Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public keys, and certificates. Hyper-elliptic curve has lower parameter size, public key size, and certificate size. The aim of the proposed work is to reduce the computational cost and communication cost. Furthermore, we validate the security properties of our proposed scheme by using the well-known simulation tool called automated validation of Internet security protocols and applications. Our approach ensures security properties such as resistance against replay attack, confidentiality, authenticity, unforgeability, integrity, non-repudiation, public verifiability, and forward secrecy.

Keywords: signcryption; security properties of signcryption; hyper-elliptic curve; AVISPA (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2019
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/7/8/686/pdf (application/pdf)
https://www.mdpi.com/2227-7390/7/8/686/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:7:y:2019:i:8:p:686-:d:253546

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:7:y:2019:i:8:p:686-:d:253546