Proxy Signcrypion Scheme Based on Hyper Elliptic Curves

  • Insaf Ullah Department of Information technology, Hazara University, Mansehra, Khyber Pakhtunkhwa, Pakistan.
  • Inam Ul Haq Department of Computer Science and Bio Informatics, Khushal Khan Khattak University, Karak, Postcode 27200, Khyber Pakhtunkhwa, Pakistan.
  • Noor Ul Amin Department of Information technology, Hazara University, Mansehra, Khyber Pakhtunkhwa, Pakistan.
  • Arif Iqbal Umar Department of Information technology, Hazara University, Mansehra, Khyber Pakhtunkhwa, Pakistan.
  • Hizbullah khattak Department of Information technology, Hazara University, Mansehra, Khyber Pakhtunkhwa, Pakistan.
Keywords: Proxy Communication, Proxy Signature, Proxy Signcrypion, Hyper Elliptic Curve.

Abstract

Delegation of rights is promising in Internet applications like distributed computing, e-cash systems, global distribution networks, grid computing, mobile agent applications, and mobile communications. This paper presents a novel Proxy Signcrypion Scheme based on hyper elliptic curves, attractive for resource constrained environment due to its shorter key size. It has properties of warrant integrity, message integrity, message confidentiality, warrant unforgeability, message unforgeability, proxy non repudiation and public verifiability. The proposed scheme has reduced computational cost as compared to the other existing schemes.

References

M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. 3rd ACM Conf. Comput. Commun. Secur. - CCS ’96, pp. 48–57, 1996.

Y. Zheng, “Digital Signcryption or How to Achieve Cost (Signature and Encryption) Cost (Signature) + Cost (Encryption),” Advances in Cryptology, LNCS, Vol. 1294. Springer-Verlag, pp.165–179, 1997.

C. Gamage, J. Leiwo, and Y. Zheng, “An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption,” in Proceedings of the 22nd Australasian Computer Science Conference ,pp.420-431, Springer,1999.

Y. Zhou, Z. Cao, and R. Lu, “Constructing Secure Warrant-Based Proxy Signcryption Schemes,” pp. 172–185, 2005.

D. H. Elkamshoushy, a. K. AbouAlsoud, and M. Madkour, “New proxy signcryption scheme with DSA verifier,” Natl. Radio Sci. Conf. NRSC, Proc., no. Nrsc, 2006.

H. Elkamchouchi, “Based on a Combination of Hard Problems,” no. October, pp. 5123–5127, 2009.

E. F. A. Elkhair, “An Efficient Proxy Signcryption Scheme,” vol. 1, no. 2, pp. 7–19, 2013.

R. Ganesan and M. Gobi, “E-Commerce Channel 4 Hyper-Elliptic Curve Cryptosystems.” Int J Netw Secur 11(3):121–127,2010.

Published
2016-02-15
How to Cite
Ullah, I., Ul Haq, I., Ul Amin, N., Umar, A. I., & khattak, H. (2016). Proxy Signcrypion Scheme Based on Hyper Elliptic Curves. International Journal of Computer (IJC), 20(1), 157-166. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/536
Section
Articles