Implementation of Certificateless Signcryption Based On Elliptic Curve Using Javascript
Abstract
Keywords
Full Text:
PDFReferences
S. William, Cryptography and Network Security, vol. 139, no. 3. Boston, USA.: Prentice Hall, 2011.
R.-J. Hwang, C.-H. Lai, and F.-F. Su, “An efficient signcryption scheme with forward secrecy based on elliptic curve,” Appl. Math. Comput., vol. 167, pp. 870–881, 2005.
Y. Zheng, “Digital signcryption or how to achieve cost (signature & encryption) cost (signature)+ cost (encryption),” Adv. Cryptol. — Crypto ’97, no. March, pp. 165–179, 1997.
A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology-CRYPTO’84, 1984, pp. 47–53.
D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.
S. Al-Riyami and K. Paterson, “Certificateless public key cryptography,” Adv. Cryptology-ASIACRYPT 2003, pp. 1–40, 2003.
Y. Zheng and H. Imai, “How to construct efficient signcryption schemes on elliptic curves,” Inf. Process. Lett., vol. 68, no. 5, pp. 227–233, 1998.
J. Baek, R. Steinfeld, and Y. Zheng, “Formal proofs for the security of signcryption,” J. Cryptol., vol. 20, no. 2, pp. 203–235, 2007.
R. Steinfeld and Y. Zheng, “A Signcryption Scheme Based on Integer Factorization,” Inf. Secur. LNCS, vol. 1975, pp. 308–322, 2000.
J. Malone-Lee, “Identity-Based Signcryption,” IACR Cryptology ePrint Archive. pp. 1–8, 2002.
Y. Yu, B. Yang, Y. Sun, and S. lin Zhu, “Identity based signcryption scheme without random oracles,” Comput. Stand. Interfaces, vol. 31, no. 1, pp. 56–62, 2009.
Z. Jin, Q. Wen, and H. Du, “An improved semantically-secure identity-based signcryption scheme in the standard model,” Comput. Electr. Eng., vol. 36, no. 3, pp. 545–552, 2010.
M. Barbosa and P. Farshim, “Certificateless Signcryption,” ACM Symp. Information, Comput. Commun. Secur., pp. 369–372, 2008.
X. Zheng and X. Yang, “Improvement of a Certificate less Signcryption Scheme without pairing,” Int. J. Sci., vol. 2, no. 7, pp. 81–87, 2015.
S. Wenbo, K. Neeraj, G. Peng, and Z. Zezhong, “Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing,” Front. Comput. Sci., vol. 8, no. 4, pp. 656–666, 2014.
S. Seo and E. Bertino, “Elliptic Curve Cryptography based Certificateless Hybrid Signcryption Scheme without Pairing,” CERIAS Tech Rep. 2013-10, 2013.
J. Won, S.-H. Seo, and E. Bertino, “A Secure Communication Protocol for Drones and Smart Objects,” in ASIA CCS’15, 2015, pp. 249–260.
B. Al-ja, M. Alhammouri, and Q. Abuein, “Id - Based Mutual Authentication with Signcryption Scheme for Mobile Devices,” in International Conference on Computer Science and Information Systems (ICSIS’2014), 2014, pp. 44–53.
DOI: http://dx.doi.org/10.19732/10.19732/vol1122016
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Computing and Informatics (IJCANDI)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
International Journal of Computing and Informatics (eISSN: 2502-2334)
Organized by Universitas Mulawarman, Universiti Malaysia Sabah, Universitas Muslim Indonesia
Published by Universitas Mulawarman
W : http://ijcandi.org
E : ijcandi@unmul.ac.id or haviluddin.ijcandi@gmail.com

IJCANDI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats