EconPapers    
Economics at your fingertips  
 

SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

Adrian Atanasiu () and Laura Savu ()
Additional contact information
Adrian Atanasiu: Faculty of Mathematics and Computer Science, Bucharest University
Laura Savu: Faculty of Mathematics and Computer Science, Bucharest University

Journal of Information Systems & Operations Management, 2012, vol. 6, issue 1, 19-28

Abstract: This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

Keywords: signcryption; Schnorr; encryption; digital signature; Mambo, proxy (search for similar items in EconPapers)
Date: 2012
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.rebe.rau.ro/RePEc/rau/jisomg/SP12/JISOM-SP12-A3.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:rau:jisomg:v:6:y:2012:i:1:p:19-28

Access Statistics for this article

More articles in Journal of Information Systems & Operations Management from Romanian-American University Contact information at EDIRC.
Bibliographic data for series maintained by Alex Tabusca ().

 
Page updated 2025-11-29
Handle: RePEc:rau:jisomg:v:6:y:2012:i:1:p:19-28