Deniable Authentication Protocol using Promised Signcrypion Based on Hyper Elliptic Curve (original) (raw)
Related papers
A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach
Mathematics, 2019
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public keys, and certificates. Hyper-elliptic curve has lower parameter size, public key size, and certificate size. The aim of the proposed work is to reduce the computational cost and communication cost. Furthermore, we validate the security properties of our proposed scheme by using the well-known simulation tool called automated validation of Internet security protocols and applications. Our approach ensures security properties such as resistance against replay attack, confidentiality, authenticity, unforgeability, integrity, non-repudiation, public verifiability, and forward secrecy.
Multimedia Tools and Applications, 2014
The need for Lightweight cryptography is on the rise as transition has been made from wired to wireless network. Wireless systems inherently are insecure and resource (power) constrained, to deal with these constraints, many techniques for symmetric and asymmetric cryptography are defined. One such important developement is Signcryption to achieve message confidentiality, integrity, sender and message authentication, non repudiation, forward secrecy as well as unforgeability,and public verifiability. Since Signcryption combines the signature and encryption therefore the cost is very less in comparison to those schemes based on the signature then encryption. Many signcryption schemes have been proposed based on El-Gamal, RSA and ECC till today. This paper highlights limitations of the existing ECC based schemes using signcryption. These limitations include some missing security aspects as well as high computation power requirement, more communication overhead incurred and large memory requirements. Further it proposes an efficient lightweight signcryption scheme based on HECC which fulfills all the security requirements. The scheme reduced significant amounts of computation, communication costs and Multimed Tools Appl message size as compared to existing signcryption schemes making it the good candidate for environments suffer from the resource limitation problems.
Multi Receiver Proxy Signcrypion Based on Hyper Elliptic Curve Cryptography
Proxy signcrypion is a cryptographic primitive which enables the original user to delegate the signing privileges to another individual called proxy who generates signcryptext on the behalf of original user. Rights delegations for sending the same copy of data to multiple recipients is important as compared to unicasting. In this paper, we present a new scheme called multi receiver proxy signcrypion based on hyper elliptic curve cryptography. In our scheme the proxy signcrypter generates signcryptext and sends to multiple recipients. We compare the proposed scheme with existing scheme in term of computational and communication cost. Our proposed scheme reduces computational cost 48 % and communication overhead 14.92 % for each user. The proposed scheme is efficient for constrained resource devices because of hyper elliptic curve. The scheme also ensures the security properties such as warrant integrity, warrant unforgeability, message confidentiality, message integrity and proxy non repudiation.
International Journal of Advanced Computer Science and Applications
It is a suitable means for multi-messages to use hybrid encryption to make a safe communication. Hybrid encryption confines encryption into two parts: one part uses public key systems to scramble a one-time symmetric key, and the other part uses the symmetric key to scramble the actual message. The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security. In this paper, we present a lightweight multi-message and multireceiver Heterogeneous hybrid signcryption scheme based on the hyper elliptic curve. We choose hyper elliptic curve for our scheme, because with 80 bits key give an equivalent level of security as contrasted and different cryptosystems like RSA and Bilinear pairing with 1024 bits key and elliptic curve with 160 bits key, respectively. Further, we validate these security requirements with our scheme, for example, confidentiality, resistance against reply attack, integrity, authenticity, nonrepudiation, public verifiability, forward secrecy and unforgeability through a well-known security validation tool called Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, our approach has low computational costs, which is attractive for low resources devices and heterogeneous environment.
Efficient signcryption schemes based on Hyperelliptic curve cryptosystem
2011
Securing data over wireless medium got significant importance because of inherent problems of power, memory and processing constraints. Hyper elliptic curve cryptosystem (HECC) is an emerging public key cryptosystem suitable for such resource constrained environment due to its high efficiency and shorter key size, HECC can be used for digital signatures and encryption to provide confidentiality and authenticity. In this paper, we proposed a resource efficient signcryption schemes based on Hyperelliptic curve cryptosystem. Compared with existing schemes our proposed scheme can save up to 40% computational cost and a minimum of 40% of Communication Overhead.
Hyper-Elliptic Curve Based Signcryption Schemes for Resource Constraint Devices in Iot
2021
The Internet of things has become part of our day to day life as many more devices are connecting to the internet, the number is increasing rapidly. IoT devices have become the element in our day to day life. Such as many tiny devices are continuously monitoring our health homes and providing sensitive information which can be analyzed and help for decision making. This important data must have enough security. Hence, the security and efficiency of these IoT devices play an important role therefore various efforts are made to make these resource constraint devices highly secure and efficient. Signcryption is one of the techniques to increase efficiency as compare to traditional signature then encryption schemes. Signcryption along with the hyper-elliptic curve (HECC) can reduce the computational cost of the encryption schemes along with the provision of higher security.
International Journal of Communication Systems, 2018
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for wireless sensor network because of their complexity compared with systems based on lower genera, especially elliptic curves. Our contribution shows that for low cost security applications HECs cryptosystems can outperform elliptic curve cryptosystems. The aim of this paper is to propose a discrete logarithm problem-based lightweight secure communication system using HEC. We propose this for different genus curves over varied prime fields performing a full scale study of their adaptability to various types of constrained networks. Also, we propose to evaluate the performance of the protocol for computational times with respect to different genus for main operations like Jacobian, Divisor identifications, key generation, signature generation/verification, message encryption, and decryption by changing the size of the field. A formal security model was established based on the hardness of HEC-Decision Diffie-Hellman (HEC-DDH). Finally, a comparative analysis with ECC-based cryptosystems was made, and satisfactory results were obtained.
2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering, 2014
ABSTRACT Mobile Instant Messenger is an IM application that need communication fastly and in a secured manner. A good level security with strong autentication must be applied to ensure data transmission between IM sender and IM recipient over public network is valid. This paper propose a new method for securing message IM with an efficient autentication method. In this research, an efficient autentication method will implement Hyper Elliptic Curve Cryptosystem (HECC) algorithm in generating and verifiying the message sign while occur data transaction. The main function of signing message is to autenticate data to ensure validation of data. Then, the sign method used to ensure unauthorized person cannot change the original data or information that sent through the network. This method developed to give auntentication user with key pair per session and using it while communication running between sender and receiver.it is a novel approach in IM auntentication method to elevate the security level of data.
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
Computers, Materials & Continua, 2022
Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a hyperelliptic curve cryptography (HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with the aim of improving security while lowering computational and communication overhead in IIoT environment. HECC with 80-bit smaller key and parameters sizes offers similar security as elliptic curve cryptography (ECC) with 160-bit long key and parameters sizes. We assessed the IIoT-CS scheme security by applying formal and informal security evaluation techniques. We used Real or Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formal security analysis and proved that the IIoT-CS scheme provides resistance to various attacks. Our proposed IIoT-CS scheme is relatively less expensive compared to the current state-of-the-art in terms of computational cost and communication overhead. Furthermore, the IIoT-CS scheme is 31.25% and This work is licensed under a Creative Commons Attribution 4.
Secure protocol for Mobile Agents Using Proxy Signcryption Scheme Based on Hyper Elliptic Curve
Proxy signcryption are used in mobile commerce for the delegation of signing privileges these days. On the other hand hyper elliptic curve cryptography is attractive for low resource devices. The paper presents a new protocol for mobile agents using proxy signcryption based on hyper elliptic curve. The protocol is designed for resource constrained devices e.g. mobile phone and smart card. The proposed protocol enables the owner to give their signing privileges to proxy agent and the proxy agent sign the document on behalf of owner and inter-link with bank to perform financial services with merchant. It also provides the security properties like warrant integrity, message confidentiality, message integrity, warrant unforgeability, message unforgeability and proxy non repudiation.