A Review of Signcryption Schemes Based on Hyper Elliptic Curve

Now-a-days security is a challenging task in different types of networks, such as Mobile Networks, Wireless Sensor Networks (WSN) and Radio Frequency Identifications Systems (RFIS) etc, to overcome these challenges we use sincryption. Signcryption is a new public key cryptographic primitive that performs the functions of digital signature and encryption in single logical step. The main contribution of signcrytion scheme, it is more suitable for low constrained environment. Moreover some signcryption schemes based on RSA, Elliptic Curve (EC) and Hyper Elliptic Curve (HEC). This paper contains a critical review of signcryption schemes based on hyper elliptic curve, since it reduce communication and computational costs for low constrained devices. It also explores advantages and disadvantages of different signcryption schemes based on HEC.

[1]  Neal Koblitz,et al.  Hyperelliptic cryptosystems , 1989, Journal of Cryptology.

[2]  Dennis Meert,et al.  Bilinear Pairings in Cryptography , 2009 .

[3]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[4]  Nizamuddin,et al.  Efficient signcryption schemes based on Hyperelliptic curve cryptosystem , 2011, 2011 7th International Conference on Emerging Technologies.

[5]  A. Nelasa,et al.  Usage of Hyperelliptic Curves in the Digital Signature Protocol , 2006, 2006 International Conference - Modern Problems of Radio Engineering, Telecommunications, and Computer Science.

[6]  J. PREMALATHA,et al.  Secure Signcryption on Hyper Elliptic Curve with Sensor-Based Random Number , 2015 .

[7]  Xiaoyuan Yang,et al.  Hyper-Elliptic Curves Cryptosystem Based Blind Signature , 2009, 2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering.

[8]  Neal Koblitz,et al.  A Family of Jacobians Suitable for Discrete Log Cryptosystems , 1988, CRYPTO.

[9]  Muhammad Sher,et al.  Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem , 2011, 8th International Conference on High-capacity Optical Networks and Emerging Technologies.

[10]  Xuan Wu Zhou Improved Signcryption Schemes Based on Hyper-Elliptic Curves Cryptosystem , 2010 .

[11]  A. Menezes An Introduction to Pairing-Based Cryptography , 2005 .

[12]  C. Moler,et al.  Advances in Cryptology , 2000, Lecture Notes in Computer Science.

[13]  Ramachandran Ganesan,et al.  A Novel Digital Envelope Approach for A Secure E-Commerce Channel , 2010, Int. J. Netw. Secur..

[14]  Anuj Kumar Singh A Review of Elliptic Curve based Signcryption Schemes , 2014 .

[15]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[16]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  John Malone-Lee,et al.  Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..

[20]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[21]  Shehzad Ashraf Ch,et al.  Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem , 2011 .

[22]  Muhammad Sher,et al.  An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography , 2014, Multimedia Tools and Applications.

[23]  Alfred Menezes,et al.  Pairing-Based Cryptography at High Security Levels , 2005, IMACC.

[24]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[25]  Hideki Imai,et al.  How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..