CLC- and PKI-based Hybrid Signcryption Scheme Using Bilinear Pairing for Secure Heterogeneous Vehicle-to-Infrastructure Communications

Author(s):  
Ikram Ali ◽  
Yong Chen ◽  
Mohammad Faisal ◽  
Meng Li
2011 ◽  
Vol 1 ◽  
pp. 198-203
Author(s):  
Xiu Ying Yu ◽  
Da Ke He

Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based multi-signcryption scheme cannot offer the function of public verifiability, based on identity and bilinear pairing on the Elliptic Curve, a new scheme with public verifiability is proposed. In the scheme, with the steps which is comparatively independent to the signcryption process, it can provide the public verification of each signcryption in need. Therefore, our scheme efficiently achieves the cryptographic functions of multi-signcryption.


2013 ◽  
Author(s):  
Mingwen Wang ◽  
Zhiyuan Ren ◽  
Jun Cai ◽  
Wentao Zheng

2011 ◽  
Vol 22 (8) ◽  
pp. 1918-1926 ◽  
Author(s):  
Wen-Hao LIU ◽  
Chun-Xiang XU

Author(s):  
Peng-zhi Tang ◽  
Qing-lan Zhang ◽  
Jun-fang Yang

2020 ◽  
Vol 39 (6) ◽  
pp. 8487-8498
Author(s):  
Malathi Devarajan ◽  
N. Sasikaladevi

With ever growing popularity, wireless communication system also vulnerable to various security attacks. To provide high level security, many cryptographic solutions have been proposed. One such solution is signcryption, where authenticity and confidentiality provided by single logical step. Therefore, signcryption scheme helps to reduce computational cost, but it is not feasible for resource constraint environments. Because, most of the existing approaches were based on El-Gamal, bilinear pairing, Rivest-Shamir-Adleman (RSA), and Elliptic curve Cryptography (ECC). They consume more energy due to their increased key size. Hence, the new signcryption approach is proposed based on Hyper Elliptic Curve Cryptosystem (HECC) whose key size is much lesser than ECC. It significantly reduces the cost of computation and communication overhead by half the amount of ECC which suits well for resource constraint environments. Further, the proposed scheme attains necessary security features along with forward secrecy and public verifiability. On the other hand, the security of the approach is validated through an automated protocol validation tool – AVISPA.


Sign in / Sign up

Export Citation Format

Share Document