Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System

  • Insaf Ullah Department of Information technology Hazara University
  • Noor Ul Amin Department of Information technology Hazara University
  • Arif Iqbal Umar Department of Information technology Hazara University
  • Hizbullah khattak Department of Information technology Hazara University
Keywords: proxy signature, promised signature, proxy signcrypion, promised signcrypion, elliptic curve.

Abstract

With the rapid growth in internet technology anonymity, repudiation and smacking the contents of messages are required for illegal businesses such as money laundering etc. In this paper we design and analyze a proxy promised signcrypion scheme based on elliptic curve cryptosystem. In this system the sender/original signer can give the authority of signcrypion to another entity namely proxy signcrypter and he generates promised signcryptext on the place of sender. The scheme is accomplished aim to improve the previous crypto-systems, due to the elliptic curve small system parameter, small public key certificates, faster implementation, low power consumption and small hardware processor requirements. This ECC based scheme provides high security and efficiency.

References

. Y. Zheng, “Digital Signcryption or How to Achieve Cost (Signature and Encryption) Cost (Signature) + Cost (Encryption),” Advances in Cryptology, LNCS, Vol. 1294. Springer-Verlag, pp.165–179, 1997.

. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. 3rd ACM Conf. Comput. Commun. Secur. - CCS ’96, pp. 48–57, 1996.

. C. Gamage, J. Leiwo, and Y. Zheng, “An Efficient Scheme for Secure Message Transmission using Proxy-Signcryption,” in Proceedings of the 22nd Australasian Computer Science Conference ,pp.420-431, Springer,1999.

. Dwork, C., Naor, M., & Sahai, “Concurrent zero-knowledge”. In Proceedings of the thirtieth annual ACM symposium on Theory of computing (pp. 409-418). ACM, 1998.

. Hwang, Shin-Jia, and Yun-Hao Sung. "Confidential deniable authentication using promised Signcryption." Journal of Systems and Software 84, no. 10 (2011): 1652-1659.

. Z. Zhang, “ A New publicly verifiable proxy signcryption scheme”, In Progress on Cryptography2004).

. D. H. Elkamshoushy (2006) New proxy signcryption scheme with DSA verifier, Natl. Radio Sci. Conf. NRSC, Proc., no. Nrsc.

. Elkamchouchi et al ,“a new efficient strong proxy Signcryption scheme based on a combination of hard problems”, IEEE International Conference on Systems, Man and Cybernetics, 2009.

. Hwang, S. J., & Chi, J. F. , “Non-Interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity”. Journal of Applied Science and Engineering, 16(3), 305-318,2013.

. Harn, L., & Ren, J, “ Design of fully deniable authentication service for e-mail applications”. Communications Letters, IEEE, 12(3), 219-221, 2008.

. Hwang, S. J., & Chi, J. F, “Non-Interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity”. Journal of Applied Science and Engineering, 16(3), 305-318, 2013.

. Di Raimondo, M., & Gennaro, R, “New approaches for deniable authentication”. Journal of cryptology, 22(4), 572-615,2009.

. Jin, C., Xu, C., Zhang, X., Xie, Q., & Li, F. (2013). A novel certificateless deniable authentication protocol. IACR Cryptology ePrint Archive, 2013, 414.

Published
2016-02-15
How to Cite
Ullah, I., Ul Amin, N., Umar, A. I., & khattak, H. (2016). Proxy Promised Signcrypion Scheme Based on Elliptic Curve Crypto System. International Journal of Computer (IJC), 20(1), 167-173. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/541
Section
Articles