SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES
Adrian Atanasiu () and
Laura Savu ()
Additional contact information
Adrian Atanasiu: Faculty of Mathematics and Computer Science, Bucharest University
Laura Savu: Faculty of Mathematics and Computer Science, Bucharest University
Journal of Information Systems & Operations Management, 2012, vol. 6, issue 1, 19-28
Abstract:
This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.
Keywords: signcryption; Schnorr; encryption; digital signature; Mambo, proxy (search for similar items in EconPapers)
Date: 2012
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/SP12/JISOM-SP12-A3.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:6:y:2012:i:1:p:19-28
Access Statistics for this article
More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().