Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem

Security of transmitted information is a key element for any communication system it becomes more important as for as resource constrained and wireless/mobile networks are concerned, as security is an energy, memory and processing extensive application while securing resource constrained networks a care must be taken regarding usage of energy, memory and processing, as technology grows the need of securing data in resource constrained networks is getting more importance. Hyper elliptic curve cryptosystem can ensure confidentiality and authenticity by the use of digital signatures and encryption. HECC is the right choice for resource constrained networks, it provides high efficiency and shorter key size while providing same level of security as other public key cryptosystems provides. In this paper, we proposed two resource efficient Signcryption Schemes with forward secrecy based on Hyperelliptic Curve Cryptosystem The proposed schemes not only provide message confidentiality, authentication, integrity, unforgeability, and non-repudiation, but also forward secrecy

[1]  Neal Koblitz,et al.  Hyperelliptic cryptosystems , 1989, Journal of Cryptology.

[2]  Guang Yang,et al.  Software development projects IRSE buffer settings and simulation based on critical chain , 2010 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Xuanwu Zhou Improved Ring Signature Scheme Based on Hyper-Elliptic Curves , 2009, 2009 Second International Conference on Future Information Technology and Management Engineering.

[5]  Nizamuddin,et al.  Efficient signcryption schemes based on Hyperelliptic curve cryptosystem , 2011, 2011 7th International Conference on Emerging Technologies.

[6]  Ramachandran Ganesan,et al.  A Novel Hybrid Security Model for E-Commerce Channel , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[7]  Xiaoyuan Yang,et al.  Hyper-elliptic curves based group signature , 2009, 2009 Chinese Control and Decision Conference.

[8]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  R Ganesan,et al.  A Secured Hybrid Architecture Model for Internet Banking (e-Banking) , 2009 .

[11]  Xiaoyuan Yang,et al.  Hyper-Elliptic Curves Cryptosystem Based Blind Signature , 2009, 2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering.

[12]  Lin You,et al.  Effective generalized equations of secure hyperelliptic curve digital signature algorithms , 2010 .

[13]  Ramachandran Ganesan,et al.  A Novel Digital Envelope Approach for A Secure E-Commerce Channel , 2010, Int. J. Netw. Secur..